Merge branch 'main' into main
commit
f998197bcc
|
@ -1,4 +1,7 @@
|
|||
http/exposed-panels/opentouch-multimediaservices-panel.yaml
|
||||
http/exposed-panels/rcdevs-webadm-panel.yaml
|
||||
http/exposed-panels/solarwinds-arm-panel.yaml
|
||||
http/exposed-panels/webtitan-cloud-panel.yaml
|
||||
http/misconfiguration/unauth-opache-control-panel.yaml
|
||||
http/technologies/atlassian-connect-descriptor.yaml
|
||||
http/vulnerabilities/cisco/cisco-broadworks-log4j-rce.yaml
|
||||
|
@ -8,6 +11,7 @@ http/vulnerabilities/other/f-secure-policymanager-log4j-rce.yaml
|
|||
http/vulnerabilities/other/flexnet-log4j-rce.yaml
|
||||
http/vulnerabilities/other/fortiportal-log4j-rce.yaml
|
||||
http/vulnerabilities/other/jitsi-meet-log4j-rce.yaml
|
||||
http/vulnerabilities/other/livebos-file-read.yaml
|
||||
http/vulnerabilities/other/logstash-log4j-rce.yaml
|
||||
http/vulnerabilities/other/manage-engine-dc-log4j-rce.yaml
|
||||
http/vulnerabilities/other/okta-log4j-rce.yaml
|
||||
|
@ -19,3 +23,4 @@ http/vulnerabilities/other/splunk-enterprise-log4j-rce.yaml
|
|||
http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml
|
||||
http/vulnerabilities/wordpress/wp-kadence-blocks-rce.yaml
|
||||
javascript/enum/smb-enum.yaml
|
||||
javascript/network/detection/oracle-tns-listner.yaml
|
||||
|
|
|
@ -34,7 +34,7 @@ dns:
|
|||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- CNAME\t.*\.(us|af|ap|ca|eu|me|sa|il)\-(north|east|west|south|northeast|southeast|central)\-[1-9]+\.elasticbeanstalk\.com
|
||||
- CNAME\t[a-z0-9_-]*\.(us|af|ap|ca|eu|me|sa|il)\-(north|east|west|south|northeast|southeast|central)\-[1-9]+\.elasticbeanstalk\.com
|
||||
|
||||
- type: word
|
||||
words:
|
||||
|
@ -45,4 +45,4 @@ dns:
|
|||
dsl:
|
||||
- cname
|
||||
|
||||
# digest: 4a0a00473045022012f08819e11892c111bb05687d15d7778724b0c8a0dc3b273942a808abb8db5d022100975f67abe8561aaf4ce70dae68f9e690a349735e2182fbf3cf0d1576d0e12d87:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b17bf9a80ae6819d64cc1a58b2cf349b843548dcbfd9d9455230cace98f79b04022100cec30c98b7df5b5d7d359146fb95c16c511856e3d7648b50b0a3e671e4b81b01:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -22,227 +22,227 @@ file:
|
|||
- type: regex
|
||||
name: Backup file
|
||||
regex:
|
||||
- "(?i)(\\.bak|\\.backup|\\.bkp|\\._bkp|\\.bk|\\.BAK)"
|
||||
- "(?i)(\\.bak|\\.backup|\\.bkp|\\._bkp|\\.bk|\\.BAK)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: PHP Source
|
||||
regex:
|
||||
- "(?i)(\\.php)(\\.~|\\.bk|\\.bak|\\.bkp|\\.BAK|\\.swp|\\.swo|\\.swn|\\.tmp|\\.save|\\.old|\\.new|\\.orig|\\.dist|\\.txt|\\.disabled|\\.original|\\.backup|\\._back|\\._1\\.bak|~|!|\\.0|\\.1|\\.2|\\.3)"
|
||||
- "(?i)(\\.php)(\\.~|\\.bk|\\.bak|\\.bkp|\\.BAK|\\.swp|\\.swo|\\.swn|\\.tmp|\\.save|\\.old|\\.new|\\.orig|\\.dist|\\.txt|\\.disabled|\\.original|\\.backup|\\._back|\\._1\\.bak|~|!|\\.0|\\.1|\\.2|\\.3)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: ASP Source
|
||||
regex:
|
||||
- "(?i)(\\.asp)(\\.~|\\.bk|\\.bak|\\.bkp|\\.BAK|\\.swp|\\.swo|\\.swn|\\.tmp|\\.save|\\.old|\\.new|\\.orig|\\.dist|\\.txt|\\.disabled|\\.original|\\.backup|\\._back|\\._1\\.bak|~|!|\\.0|\\.1|\\.2|\\.3)"
|
||||
- "(?i)(\\.asp)(\\.~|\\.bk|\\.bak|\\.bkp|\\.BAK|\\.swp|\\.swo|\\.swn|\\.tmp|\\.save|\\.old|\\.new|\\.orig|\\.dist|\\.txt|\\.disabled|\\.original|\\.backup|\\._back|\\._1\\.bak|~|!|\\.0|\\.1|\\.2|\\.3)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Database file
|
||||
regex:
|
||||
- "(?i)\\.db|\\.sql"
|
||||
- "(?i)\\.db|\\.sql('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Bash script
|
||||
regex:
|
||||
- "(?i)\\.sh|\\.bashrc|\\.zshrc"
|
||||
- "(?i)(\\.sh|\\.bashrc|\\.zshrc)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: 1Password password manager database file
|
||||
regex:
|
||||
- "(?i)\\.agilekeychain"
|
||||
- "(?i)\\.agilekeychain('|\")"
|
||||
|
||||
- type: regex
|
||||
name: ASP configuration file
|
||||
regex:
|
||||
- "(?i)\\.asa"
|
||||
- "(?i)\\.asa('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Apple Keychain database file
|
||||
regex:
|
||||
- "(?i)\\.keychain"
|
||||
- "(?i)\\.keychain('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Azure service configuration schema file
|
||||
regex:
|
||||
- "(?i)\\.cscfg"
|
||||
- "(?i)\\.cscfg('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Compressed archive file
|
||||
regex:
|
||||
- "(?i)(\\.zip|\\.gz|\\.tar|\\.rar|\\.tgz)"
|
||||
- "(?i)(\\.zip|\\.gz|\\.tar|\\.rar|\\.tgz)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Configuration file
|
||||
regex:
|
||||
- "(?i)(\\.ini|\\.config|\\.conf)"
|
||||
- "(?i)(\\.ini|\\.config|\\.conf)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Day One journal file
|
||||
regex:
|
||||
- "(?i)\\.dayone"
|
||||
- "(?i)\\.dayone('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Document file
|
||||
regex:
|
||||
- "(?i)(\\.doc|\\.docx|\\.rtf)"
|
||||
- "(?i)(\\.doc|\\.docx|\\.rtf)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: GnuCash database file
|
||||
regex:
|
||||
- "(?i)\\.gnucash"
|
||||
- "(?i)\\.gnucash('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Include file
|
||||
regex:
|
||||
- "(?i)\\.inc"
|
||||
- "(?i)\\.inc('|\")"
|
||||
|
||||
- type: regex
|
||||
name: XML file
|
||||
regex:
|
||||
- "(?i)\\.xml"
|
||||
- "(?i)\\.xml('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Old file
|
||||
regex:
|
||||
- "(?i)\\.old"
|
||||
- "(?i)\\.old('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Log file
|
||||
regex:
|
||||
- "(?i)\\.log"
|
||||
- "(?i)\\.log('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Java file
|
||||
regex:
|
||||
- "(?i)\\.java"
|
||||
- "(?i)\\.java('|\")"
|
||||
|
||||
- type: regex
|
||||
name: SQL dump file
|
||||
regex:
|
||||
- "(?i)\\.sql"
|
||||
- "(?i)\\.sql('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Excel file
|
||||
regex:
|
||||
- "(?i)(\\.xls|\\.xlsx|\\.csv)"
|
||||
- "(?i)(\\.xls|\\.xlsx|\\.csv)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Certificate file
|
||||
regex:
|
||||
- "(?i)(\\.cer|\\.crt|\\.p7b)"
|
||||
- "(?i)(\\.cer|\\.crt|\\.p7b)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Java key storte
|
||||
regex:
|
||||
- "(?i)\\.jks"
|
||||
- "(?i)\\.jks('|\")"
|
||||
|
||||
- type: regex
|
||||
name: KDE Wallet Manager database file
|
||||
regex:
|
||||
- "(?i)\\.kwallet"
|
||||
- "(?i)\\.kwallet('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Little Snitch firewall configuration file
|
||||
regex:
|
||||
- "(?i)\\.xpl"
|
||||
- "(?i)\\.xpl('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Microsoft BitLocker Trusted Platform Module password file
|
||||
regex:
|
||||
- "(?i)\\.tpm"
|
||||
- "(?i)\\.tpm('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Microsoft BitLocker recovery key file
|
||||
regex:
|
||||
- "(?i)\\.bek"
|
||||
- "(?i)\\.bek('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Microsoft SQL database file
|
||||
regex:
|
||||
- "(?i)\\.mdf"
|
||||
- "(?i)\\.mdf('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Microsoft SQL server compact database file
|
||||
regex:
|
||||
- "(?i)\\.sdf"
|
||||
- "(?i)\\.sdf('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Network traffic capture file
|
||||
regex:
|
||||
- "(?i)\\.pcap"
|
||||
- "(?i)\\.pcap('|\")"
|
||||
|
||||
- type: regex
|
||||
name: OpenVPN client configuration file
|
||||
regex:
|
||||
- "(?i)\\.ovpn"
|
||||
- "(?i)\\.ovpn('|\")"
|
||||
|
||||
- type: regex
|
||||
name: PDF file
|
||||
regex:
|
||||
- "(?i)\\.pdf"
|
||||
- "(?i)\\.pdf('|\")"
|
||||
|
||||
- type: regex
|
||||
name: PHP file
|
||||
regex:
|
||||
- "(?i)\\.pcap"
|
||||
- "(?i)\\.pcap('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Password Safe database file
|
||||
regex:
|
||||
- "(?i)\\.psafe3"
|
||||
- "(?i)\\.psafe3('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Potential configuration file
|
||||
regex:
|
||||
- "(?i)\\.yml"
|
||||
- "(?i)\\.yml('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Potential cryptographic key bundle
|
||||
regex:
|
||||
- "(?i)(\\.pkcs12|\\.p12|\\.pfx|\\.asc|\\.pem)"
|
||||
- "(?i)(\\.pkcs12|\\.p12|\\.pfx|\\.asc|\\.pem)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Potential private key
|
||||
regex:
|
||||
- "(?i)otr.private_key"
|
||||
- "(?i)otr.private_key('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Presentation file
|
||||
regex:
|
||||
- "(?i)(\\.ppt|\\.pptx)"
|
||||
- "(?i)(\\.ppt|\\.pptx)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Python file
|
||||
regex:
|
||||
- "(?i)\\.py"
|
||||
- "(?i)\\.py('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Remote Desktop connection file
|
||||
regex:
|
||||
- "(?i)\\.rdp"
|
||||
- "(?i)\\.rdp('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Ruby On Rails file
|
||||
regex:
|
||||
- "(?i)\\.rb"
|
||||
- "(?i)\\.rb('|\")"
|
||||
|
||||
- type: regex
|
||||
name: SQLite database file
|
||||
regex:
|
||||
- "(?i)\\.sqlite|\\.sqlitedb"
|
||||
- "(?i)\\.sqlite|\\.sqlitedb('|\")"
|
||||
|
||||
- type: regex
|
||||
name: SQLite3 database file
|
||||
regex:
|
||||
- "(?i)\\.sqlite3"
|
||||
- "(?i)\\.sqlite3('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Sequel Pro MySQL database manager bookmark file
|
||||
regex:
|
||||
- "(?i)\\.plist"
|
||||
- "(?i)\\.plist('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Shell configuration file
|
||||
regex:
|
||||
- "(?i)(\\.exports|\\.functions|\\.extra)"
|
||||
- "(?i)(\\.exports|\\.functions|\\.extra)('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Temporary file
|
||||
|
@ -252,21 +252,21 @@ file:
|
|||
- type: regex
|
||||
name: Terraform variable config file
|
||||
regex:
|
||||
- "(?i)\\.tfvars"
|
||||
- "(?i)\\.tfvars('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Text file
|
||||
regex:
|
||||
- "(?i)\\.txt"
|
||||
- "(?i)\\.txt('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Tunnelblick VPN configuration file
|
||||
regex:
|
||||
- "(?i)\\.tblk"
|
||||
- "(?i)\\.tblk('|\")"
|
||||
|
||||
- type: regex
|
||||
name: Windows BitLocker full volume encrypted data file
|
||||
regex:
|
||||
- "(?i)\\.fve"
|
||||
- "(?i)\\.fve('|\")"
|
||||
|
||||
# digest: 490a0046304402203342df27b75080be4762275375e19b63832c89211544474786cce395d13a433302205bfa8b32a8b5f202b6562cc5ac1e8ea50086bca8c54ce36eec20e82d30449b22:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -1 +1 @@
|
|||
2.0.30
|
||||
2.0.31
|
|
@ -1,5 +1 @@
|
|||
<<<<<<< HEAD
|
||||
2.1.4.1
|
||||
=======
|
||||
2.1.3.1
|
||||
>>>>>>> parent of 668b37f13f (Auto WordPress Plugins Update [Tue Oct 24 04:12:08 UTC 2023] :robot:)
|
||||
2.1.4.1
|
|
@ -1 +1 @@
|
|||
12.7
|
||||
12.7.1
|
|
@ -1 +1 @@
|
|||
8.0.0
|
||||
8.0.1
|
|
@ -1 +1 @@
|
|||
2.2.0
|
||||
2.2.1
|
|
@ -1 +1 @@
|
|||
2.3.6
|
||||
2.3.7
|
|
@ -1 +1 @@
|
|||
7.10.4
|
||||
7.10.5
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2000-0114
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.09258
|
||||
epss-percentile: 0.93985
|
||||
epss-percentile: 0.9399
|
||||
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220594d6a119bc8822cc12ed51258331574b808b7067fa020195bea46ffecd75f130220164dcf7671458ddd47f0d40ba026333ad9b8f119df5d40b4d7d930da0a8fa1d9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100979a15726953b32b1ed7447a7549e4a290fda526da4f5bfc06321eda21d01454022079ae1ec19cf8e121523ce85500f2a0df18e13a7d38658256430f72e47f430a78:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2001-0537
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.88063
|
||||
epss-percentile: 0.98318
|
||||
epss-percentile: 0.98317
|
||||
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,4 +48,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022066df0e141e95c3353fdb00e33e6efcfad326fa28d9528547f7cb8cf20816c63e022100d3568ad51a3aee6c6906e90b75a5181e16b7b4da222d883b0a1e88ef3b623ddd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100f3f98cc6805a18012729cb8c709805ded7c032a89f6ef8182b54f53d6c0c6308022100cd628c4d587a76aee21534145e5981cd06462589f0b28c1994a22f16731f82eb:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2002-1131
|
||||
cwe-id: CWE-80
|
||||
epss-score: 0.06018
|
||||
epss-percentile: 0.92639
|
||||
epss-percentile: 0.92643
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 5
|
||||
|
@ -54,4 +54,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100b77f7809b8fd1dcf80882729a8361d74e6746a670ddb8abdb2ca3f0fa5bfa8840221008df7d67ca796d7e13195f8c5dc20ef00c423a4e7cc9b8bc483e3223899eae629:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100e203fc06f5889b28733f675dda86b8ce443c30ca60cb9a1875d5512dcb8861b702204871f7748df86b1b0b3551f132900b5ebd19b4496d7ac7573e2d6d60c1dcb7a8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2004-0519
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02285
|
||||
epss-percentile: 0.88422
|
||||
epss-percentile: 0.88413
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -47,4 +47,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100a4c0d2bd6fee42619d1551b20df8b90841dbb53b8fd5244ae8907a038cdc1741022100f00e52aaade1078c0102b61ee1b78439121eaace98cd2c72e2ec45d801cc5d8b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206ec30f5b65a5336b9d6dc343f135589a1a5f37182cc770f00c756c71f00ec10402207ce791c1bc172ac5b2cf0bb53ac9cbb6a363b4ebdd7898aef36587605d9045fc:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2004-1965
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0113
|
||||
epss-percentile: 0.83056
|
||||
epss-percentile: 0.83061
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
||||
# digest: 490a004630440220383471a84b36ec14a07203a534c66501020553612890be550b295d0261566672022075542616d6ff1c3ea640d3885aec7054e45ec03f226f509b2b2439b684016b0a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a0048304602210090acc54faa079ae3c9d72da81eaf5a09e9cf5a86ec4a0716b0b7fd5cbb516321022100b7979643c1cd3f09a82576cff60b5f1ba32a14dc6c4923fe315af987b4311096:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2005-2428
|
||||
cwe-id: CWE-200
|
||||
epss-score: 0.01188
|
||||
epss-percentile: 0.83547
|
||||
epss-percentile: 0.83555
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2005-3344
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02158
|
||||
epss-percentile: 0.8808
|
||||
epss-percentile: 0.88068
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402202ed73c4b7fa4022cbad18a5aba1370fad4e0414851bb1a6868dc0a1f1c3d56460220434c42e76e4aa981aad2b44ab0f2e7415b4ec4323a745a8d98e456c3a7d89f5e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220797ce3f10c9996efe615e9079de3781051237e812f58e18645ccf337b7b113e10220070f92c0f6478b7b232084f7606fbb39cb58f04b39cd9f449c0a8b550bbb5e51:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -21,7 +21,7 @@ info:
|
|||
cve-id: CVE-2005-3634
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02843
|
||||
epss-percentile: 0.89542
|
||||
epss-percentile: 0.89536
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
|
||||
|
||||
# digest: 490a0046304402206ed47e9ae10df817c8fcec3d7be80bce8ffbc350a9967f1a95431bc8437956a902206a5dde6a4ef4a769f50aa293d237a315bbe2cd19eb5fe00e37176e80de9e8c03:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100947c760f806574cf2d22f545d575f09d0bc3d7b9a280a242ab55fdbb488f1d32022049aabe03964bde6ccd5274546033eabbe52b069d90514b3e1997d29f31d51251:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2005-4385
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00294
|
||||
epss-percentile: 0.65722
|
||||
epss-percentile: 0.65725
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402206f8775b7b8e22dfeb024306162e9925b039306ab668677dbc07149b870cb029f02203b1997570e9c31ca9d36c858fa154becbd8bfc77fc0363a1e9eb362fb7ffadd3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ff3fb11f7ff616dbbfc4a83e38e3985510b02823c86d8a217ab630da580b2eae02207881e08bf363f17596f191cffa34c8f3e10625051f2ff19113aa92987cabe116:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2006-1681
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.01015
|
||||
epss-percentile: 0.82066
|
||||
epss-percentile: 0.82067
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100b538eb6a17564447323cbcfbb323eaa76c6d1ceb2b5b1bf22855af360d17f95b022100c5568f3bc82f19e48e8608a7a6e9e1545b71667650a1d3318d05d7fdb614e835:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221008d96153070a8cf561bc4445edab8e9daa363ad4fe0da9c8d941d5c66b9ccd9c0022100de660b8f3a95891502f696ce59214438ddd131cdc7dcbaa97822d3b7bb3af070:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2006-2842
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.2925
|
||||
epss-percentile: 0.96356
|
||||
epss-percentile: 0.96352
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205f9e26fe3e09ebe979c40ad31a75049cc1626059f1b18812ec3761b67503f545022100aff421419c2fba7d13bab0a3f977351c5884442f922a5ea63fc241c6541c4643:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b5d7fd5ee40b4ce9eff825b1a98005fe9b52206f0877b810446bd00ed8797ac602206e0bf8d91f2310b12601971ace525b0bd94c2d535f796127a47cd32defa038f7:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2007-0885
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0059
|
||||
epss-percentile: 0.75808
|
||||
epss-percentile: 0.75817
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -44,4 +44,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100c2594c9470d6ef5a5fec60840d26ded64a4719d0cf774e51a937caa4415451e1022100af6e8e08c81bda713b80244c703ec5b432caa9c84c82bdd11bccd7c7e98121a7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100ba306e48f593ba41c002526cdfd8ced6ccf5144a18c1f163a3b3afa738c50b8f022100d1d10175fd5032825f82c367ffc24453918962423a9c3a9ab771fea198c9f60e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2007-4504
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01677
|
||||
epss-percentile: 0.86251
|
||||
epss-percentile: 0.86253
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502203f8c97a191c0dc7752a29a90463298efa0c87663703f173c3a45aaf1ebad6e47022100949ac9a49b1077abe9284fa1c2c76ccccb0ada20edc18bbbe5a7ca1ec1c0a724:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008693108df5380bd3214bd1f1d024a0d54b88c30dab67b030f6ee7527b0953bed02201f8783e4cc694abd9ab1b1c832b60965c462b131b06c9d888092e84b961f988c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2007-5728
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.02361
|
||||
epss-percentile: 0.8859
|
||||
epss-percentile: 0.88579
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -51,4 +51,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022016e6d62cd269792cdd7af643e37b3e1c7c2325610b4b9208e3a9866fd06f57cb0220144f66f23d254a523bcfc1e26adfc73c2f28ef7de0f139b5b27ea522ac6a0726:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c810232bb12ea200fc169041ba1b57b17e9de1e0bdaa0c031ceb220529588e48022100d43486da405732379956fbeac11cb51fef7bc4f786d34373260dd5ba75e1d9ae:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1059
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01493
|
||||
epss-percentile: 0.85392
|
||||
epss-percentile: 0.85394
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100aa484a00cf6b1a8413ed98745a8380cf9071d6e92db8777ad8fdc02a7241c912022100cacf11f52d4ad5d6a54a2c353945732c4f15e6017638d5e69cbaf16896449658:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402203298b836f31b04f8bf5f1c9726fc8e4072bbe1b53f4e244e8948d5ad1ddb4a8c02207614002474fc76d220e3ad7714bedc1db20497533f4e3d32e5d2de9c5724def5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-1061
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00938
|
||||
epss-percentile: 0.81321
|
||||
epss-percentile: 0.81313
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -49,4 +49,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100c8b08878453cf81f262375eba9828273beaae840326a7b56e3eb8235eac44e00022100f967cec8017a0d55d7363b3236aa1800d950c87571455bd8a83c0658e32cf8cc:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022060a50ba96c1c9538a3d4e5cf34b10bb8ea1deef6edc075ff4028821643ab2345022100d0304b993441cb532f07cbf5f4019b58f4fef67c6ba0dd19de1375a67334671b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-1547
|
||||
cwe-id: CWE-601
|
||||
epss-score: 0.03523
|
||||
epss-percentile: 0.90482
|
||||
epss-percentile: 0.9048
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 4a0a0047304502210098b13525f28b7230a233dca2db8de8acff951b5d87460a623a3c145e39a3f9040220567f0273b24e7a10bc999261651f50357ec89ba6d6a4de40e03b5c48072efe24:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502200b9687bde96db0e3b6f93ac4ef0e94209fae0fc710184ec8ff6c8840eba128be022100e5f79a4cd7b04fb34a7d775fcb5a13dc49584ba2a668f58d0a0102a216e89d51:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-2398
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00329
|
||||
epss-percentile: 0.67662
|
||||
epss-percentile: 0.67663
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2008-2650
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06344
|
||||
epss-percentile: 0.92819
|
||||
epss-percentile: 0.92823
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -46,4 +46,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022067c60c6e9e026557c6c1fe28fe69589d2c122883e28d83a1020021d4ddcea0610221009d4a45bc2c9019465c07d93e36cb85106bdcd47bd476fd2cd8b6841cdbebf432:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022023a13d76ca092132ec4972fefe9b1a7ef0c39de94d75c8f67ec8c374132e4b89022100b82ffa8a7aa2fb465caf51a78243fe768282552ec9a1b4109bc5c86ddd68f5bd:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-4668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01018
|
||||
epss-percentile: 0.82086
|
||||
epss-percentile: 0.82087
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100e5e0e17b61370e65cdf4c6cf9479d5adbe9da73d5f6d2fcf95e395394953cc15022008f3de1ad3905f99b91dc9000e9ce027042cc2fc3a0f3b7429564adb3014b687:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022003c9265bb6db39e7441666dcbbdf8e8af0e3fa3767f73171b688bdaf97e6250a02205d59b232d9680bb1822e05c9b0190a0c9ae2b882051a5b3e3c78fc579eee7c23:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-4764
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02365
|
||||
epss-percentile: 0.88599
|
||||
epss-percentile: 0.88587
|
||||
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502203749853db55e3557bb6785de6c95ea4c15391d2d069c82b8199c64c583739497022100bb2c867bd95046efd860adf871f0b88a8527cb8116df5d5df8131c83d2b8ebd4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402204d39157da9c690dd6a973f41a8f6816f8e36eb18f9331f4e49efb2b84c09a392022010b12fbca49e4c1da8a483481f152ba82d1d4f91d5b6e457d4dea3a9af916d02:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-5587
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02331
|
||||
epss-percentile: 0.88516
|
||||
epss-percentile: 0.88504
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100bc7cf30d4891a6ddfb879b069e46fd77d86f16118db9db00ecc686b60f433b2202205a6f05461cf73d2cf0ab1b719b34c8b3721d7f21ca5cba1ed7fccbc94ca99858:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220593f15a80357a896445773d8d813949ed84c33af628c96212f205b007b1597d1022100ea3bbdd8bc28ec3c7403eddd80cd7a985ff28a2a92f0dbeae4413a2999b45329:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6080
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00824
|
||||
epss-percentile: 0.79993
|
||||
epss-percentile: 0.79985
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100e5a5fc79cb08ad9e3dd5e156aacafb0a317b4b9696a25b51ce42eba9cc5f011a0221009d90868e00f62d3baff3ae546f627bf4b324f4937e2128c8a3968d3a27992556:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402203b6ee07ac4aff1c55f22aa2ea2f17a91552ce82b5a2c670f6b102986952813de02202566702b1649b7b5a1852d7f74d5fedf74b9566e3a79e78a8517d1deda079183:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6172
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00509
|
||||
epss-percentile: 0.73857
|
||||
epss-percentile: 0.73858
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-6222
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01029
|
||||
epss-percentile: 0.82163
|
||||
epss-percentile: 0.82167
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100c158958b593b9ab46cae2133944ce4136ba4cb302d66216a3c0039bbb691fd0402200e31a0d4ceb770ffd38ea973362a9e96e70c1aa13e7b0575a66c0ce2f4ff0617:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100bb93e6d14a9083ab6a31aa3b1f13219037f333b103976c9c3e0b50d2f91e11f0022100a3bbd1243cedef0d39cf700ae63da91d0eaf47ce8cabd72a8add87be30416794:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2008-6465
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00421
|
||||
epss-percentile: 0.71314
|
||||
epss-percentile: 0.71315
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -52,4 +52,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100fdc3a390c30ecee3b8f8ef904f2b2a92d9be860138a37b570a534003f902b2d0022100e08debaedd69bcffcc1e2ef7123a6523fcec9943e7c1062984dcd5bf279808bd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022040b2a9b76ac4aade97b1f968381e19aee2229dd82234bde9bd68a9390a29fee6022061504b7b7831d0ea1ecc82ed3e40e1593635150997a06f90fc990ea7c25f72e7:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2008-6668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00359
|
||||
epss-percentile: 0.68987
|
||||
epss-percentile: 0.68988
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205423ef545b8ba8725fccdc95d54a549d1cf13d706ad0a47c8d9e01b7b4cd21c50221008deab9b66284642f13b2b38dd364928b8122e8f2a6b0baba5f39c90511d641b8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502204169d4edcd4c9b1f58d1a8c44164f9168602472acf8bc5dbdae0b65b10ee666e022100f2d7cee68ba5e9de40f4aaff8d10f93b10f86f54e1c548d47d1d941dc11bfb35:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -49,4 +49,4 @@ http:
|
|||
status:
|
||||
- 500
|
||||
|
||||
# digest: 4a0a00473045022100aeeb0808be93994ccd03a09f27a33c9697db33e6df680af539a5feef54274d50022044829fb0c244c83d6310f996fdd2ca6993d36fc11cd4b27973549e1e011f6301:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502204f51ea36dcbb9e5fd56d5ad8390ee5af808b4e7ee36ccb37494cb07265b94c6102210094202fdc279bc121e462c4dfba56c90d84bd56f4345f6a09f62291faa3af33f3:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2008-7269
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.01358
|
||||
epss-percentile: 0.84715
|
||||
epss-percentile: 0.84717
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: "true"
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
|
||||
|
||||
# digest: 490a0046304402205d6ee8e7c87693194ddb02c94b1b7ecd325b32a0fa74fb2b65e68c8ee079213502204eea8123e947eb8e27ed8fab53c8afc12f6e19d4feb95d565f80c7dfd96fab66:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220223a91535d7b4c1d840be8fb15efc5869f99589b5100808cdebc3019229535f802204e6c6c3b920398c32e581e5113dbc2a5355a2959efa99b6e2716978526048bf8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2009-0347
|
||||
cwe-id: CWE-59
|
||||
epss-score: 0.10982
|
||||
epss-percentile: 0.94476
|
||||
epss-percentile: 0.94481
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-0932
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04048
|
||||
epss-percentile: 0.91082
|
||||
epss-percentile: 0.91079
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044021f54cfdd8a914c78e4072035cafca80203318d5d476d3beda9e19dff6c897e8c022100f0c8420b0c845637f43e8ab332535ff70fbc90367a7ae20fb4444064edb11baa:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200ca394a5f2b4e76ed29c58ab0c924b2d552101314ee0d41593fd61042cdab4b0022031ed2fb59c277033889d962508d01a4c9d1dbdecaa25d488c5c50b6df52b5ac0:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1151
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.79256
|
||||
epss-percentile: 0.97916
|
||||
epss-percentile: 0.97915
|
||||
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -48,4 +48,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502207a877b63ae344ecd4086107a9d6ebdcba420de64ae01b943d138c343a03d70fd022100afc7b76c9139e4bf9b493214b8dd16c2aca5bfd9626bd95922d92465be4e6a29:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100a64131ccb33d60825717f6f811a4c8c916c546bd1d579cd16caa451ea7f1a40e022100b5198ad68abe24ab4d2f43b9d971d92f52a3900417dc7744ef09926cd2073fef:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-1496
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00533
|
||||
epss-percentile: 0.74446
|
||||
epss-percentile: 0.7446
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502200c2160ee2c9726723f4ac908e998c2621440a0de61d1856e1d92fbfff380eaa40221009ad6f8a2a8b4dd144303b4ada1badcd59290d991a4de0085a8edcdc87d4f9c90:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450220443fd847d1b1d38d2e159b5b4e28b6a100185174daf75b4decc1f45514fa4b69022100b61371bf46ec45bd774bdce873c8a085a3d5b6865f8aa8acfed71f11c1bfbce5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-1558
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00883
|
||||
epss-percentile: 0.8069
|
||||
epss-percentile: 0.80683
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -42,4 +42,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220506d7728a7bfeb612189b6d6b78e7f19d2b80cbd03f41b00497673e7e2f2e993022100c875a075b575d169024c42f75aef6080ffd06e7bff48ce7d3dc45f3d978e0845:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100856853142b8a79f83403c6412c551bf3dd402df336fdf9d58b8fbd7f1982c35302206d2d5d16f561d66b4f01750131bd508a33b5db57069844db5b6e0f38909513d1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-1872
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.40155
|
||||
epss-percentile: 0.96848
|
||||
epss-percentile: 0.96851
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-2015
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79857
|
||||
epss-percentile: 0.7985
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ea72234aa9f764260a031853933ad0690dc88b2163c434f33c586cd25f493fe60220455dd2d02b2f9ec67d0ffdae79b8cd772d74592be4938b9dc69ba2e6fdcddf9a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b2affb6144cae2ce3a4963c3ca83222a49f2c509779bd6a0a1f2c3332c6b730102205be88e77b21f2d8ac8ac85fd90db004747b36d62f6cb9f2f8eebe243fb6fe427:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2009-2100
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00528
|
||||
epss-percentile: 0.74339
|
||||
epss-percentile: 0.74352
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ff3107b550d2872633b94a1807a7dd30ab8ec2c70de1863a53c617c9363d97df022053bdbb600902f274307d853aa8483b89307b2ec28f25ce2babee7c025b3d9997:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100a3b97f493285a2485134fbd8f7a57cc4c95da54b04c6bf9f571d9833a2f8acfe02200414ef23e3cedc2302814b7288b92fb68ff4eb268f0a9f7a6acb7460c5581bc4:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502201e672432c6e0e4097eb89a5805e8bfb77acec77f47880f451b3017ea4a1f6338022100cd62d1b4f76df626de8bcf4f1fb4aa0755dd3ce43f1c0231965e2cae24621962:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100bd56f73bd3223631e1be34006f5834ecaf48da1bebcbfa987c2990b3218de04f022100d48ae20826ac08ab9382c6b66e0699a06357e145bf40b62e1d6ad9ad62380338:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-3318
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78147
|
||||
epss-percentile: 0.78157
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402207bce0e81eb79af41399554dd6ec8602e495c39961db62ce1906a279ee7df249e0220606c84d03c1d3db87f80e9d4605e0ebb5cf56674eec5e362a5e4c0055bba8971:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009a2dfdfff893357bcee483337277942dd63139cfc9e39868f2480a7ac92eaba5022100f242393856da2cc79af00a79f07a66fcfaf97b0a73fab6ffc7b62cf2c863a798:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4202
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01956
|
||||
epss-percentile: 0.87398
|
||||
epss-percentile: 0.87381
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100e0ba68a6504dc0e91c35603952fb798d6c55b8a970739f38171e5da3355c8cd002204aa790fb0b937599466b593dfdd28b0b7f56c331768477a75b28e03d738977bf:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b374c9ba8b30768981440e7760bd7f78bb45e76786fc0a81dafd17326b71e59b022100ea8339cb102dee6adfcd0699ea45a7cc7a33edf55e297ca00b0c5304c519119b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
cve-id: CVE-2009-4223
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01041
|
||||
epss-percentile: 0.82286
|
||||
epss-percentile: 0.82291
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -43,4 +43,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022015ab9462f4fae55ec31da6ad3c1ffc84b30fd8af8da98e7b11f7ac2b73b780bf02203ebedf43bc0713978f68929f23a9d4c42e07b01cf1af5b7c1c94cb803910fe41:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220665ab9953ae9b1b5283ee5243b649f8679bf10e1d37a265310740e1183115f3202200310b9e48d07f4e1178ee4c72f8dd29027d3588483c660b6867923b972c08dff:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2009-4679
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8002
|
||||
epss-percentile: 0.80012
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502207e9683dc1223b5f1c953c9c128dd8c85c0e354e666e31d1203e4e0358cb687a3022100b10d0b0a06c87bb2b13271c2c688ffd2ecf71970bae455179e89c8646ce88553:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009417ca24e53e35d66d7538fea5ca98a196bb6e90b402895f132bf165bae713c1022100de227451f3d6a23503f534b14d9b83cfaf7e7ad01a1396c06a23444dceda721f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2009-5020
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00215
|
||||
epss-percentile: 0.59235
|
||||
epss-percentile: 0.59256
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
|
@ -36,4 +36,4 @@ http:
|
|||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
|
||||
|
||||
# digest: 4a0a00473045022100935b7686e207f406d029cb2b1c4c16ef09cdd77d20e9aaeafe4ace192f011ceb0220630743604a963d2daf845dab8bb6477f321224588b648e4fb2fce228fa531e2b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206f3823b25c8eaa924392dfeee8ba3937ea111df53a11434c800db937ae049264022005250f6c2fc424b236ff38471e7e6c430f9c505a7fa19a8891fd0cac54de8637:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2009-5114
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02357
|
||||
epss-percentile: 0.88577
|
||||
epss-percentile: 0.88565
|
||||
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402200e0aad515127efb596a931902067084d128ff7b89d0e6deae022a6b3bd42d348022031dae69c059cd9bd12728731310cc34d491f5f3a25fb631648d650ac54a775c5:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502207643e4bd2b6fa03b5473282425207c57d7b67f9daf3bf108844d9cc504ede76c022100bb13a5587cb8ccee78fafef4e83e6e4736e2ceff886762026e775b686f22cd89:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-0157
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8002
|
||||
epss-percentile: 0.80012
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210082c6ee471e8875b80db182c6ebc7c100c78491cfabd05f862edf2b7943522df0022100b40d91da066e033b8637b360c5636df468dd1cf1bf4a55976ffbcf0a6a66402e:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502207074c9a410b1f0291db73847e147bea19b51de27964ae26c3f35b021f2fa3a5a022100a514fff5acb082ba2efabf937a9a3fc9f95075dba08188a24093789e1b6e5dde:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-0467
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0586
|
||||
epss-percentile: 0.92554
|
||||
epss-percentile: 0.92559
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a004830460221008902ba0d93a4e719f35da22d18e3b47913464c90c6eed9e5cc53a8341bffe54e022100e774e15f8fc7271356b5f45958c5f53cf8de22ce659ca8a3c654719cbe104ec3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100ca4382ea36e68adf8ccee98c1da4c2d464421983ea5ad0bdd8d1b556dc163a55022100c83dc53bce54de11007beef3cadb5ad6587c85ec3506c45abd52618f65fd2960:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0696
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.62698
|
||||
epss-percentile: 0.97456
|
||||
epss-percentile: 0.97457
|
||||
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a004830460221009a9b1bc4e8c268d221785a099982a89fbc94c2a5baf0e4f5e23da295e5e088b9022100ed576f01c885c975991644b498a6356291e2b01bb7ec23ffd6f57fee6cffb2c4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221008c2805575698de9ea00247d201f54ba28c73662473abdc4173cb718e62386a2d022100d0b7226f7e060cb00b514893764d7abbe7bdd205d0a18f7f9208a50913a67d65:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0759
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01326
|
||||
epss-percentile: 0.84512
|
||||
epss-percentile: 0.84518
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100a4d379b411461db01428ad4ded65ffe969acd7bd6e625676a39703bc6d30b82d0220055a5ffbfb83d0bbdc18d6000ea5d200f2767a27aeff224c8a80c29b744a40fc:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402200e7fc8ab81c9a1badc7fc975b16159bed286914ae9d7ba74a7bc3366730e4d2002204915cd9817b5f62f67dd1c344e18b194e801b3e564d134a5d35f7588918cb467:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402206d78b23209f21bec687bdd5f6b5dc204580fddcff17464e80e42533d01e281bc02200d960d5d24ea7e65217c6776b1c98edd2e9a9273f3124e0bd6ba84f408509726:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100bf47dd264d18386bae1fc58c805bf6f2d948d0a9b336a1af77f67832f1411dff02202a2a79cc6146af120a2a8ce0e4cd4119f5504ce0cc0b221c5b52124ca067cef1:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0943
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.8326
|
||||
epss-percentile: 0.83268
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ad309ea3016c94c268ef344b882db71dfeda38f701de40bb46fda72758ef695202204512906717b98743d5c2693e82220afcf110887ff49db8dc95fd534e3419c22a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022078cb3122accef355d6535902111629a84e6f82a346bd76352afd7bbd5571cbd402204fe92d3cb612a5ea00a8194b9be4173448dc314c60dddb8697cb0665d0280139:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210082cf7636d928b73480d0b7c2bfbfcfe81b66c77da82afbc42a3dea6f15bfb73b022100f05eceacb5cf5c17d71c9e977b786a0105bfac12b47da3552d6135abed848d8f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008e01cec80d11b31ed6a7f6104fab78317a03446c6ce6e662f02ee94dec59b95f022059af1ec983571921c9da8a6dc549b35ecfdc06bc881680e7164779080bf92ff8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0972
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79857
|
||||
epss-percentile: 0.7985
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100fd12f0bda71cd58408476fa8c69b70ae4d2d9b7284a222ad85ffd3667831ab44022100fccf6a4420d6616356ca15ee231e49fe72a426b0bd81b6e948bd575434c17402:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022017705c4610114da5ccae5f2cc952d02b4ad429e81924b9913e7e75dd3c4aeb41022100e19f465b19203fdec8962bce772975a17a036ca98b3dfdcf4e8d48911038a880:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-0982
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80523
|
||||
epss-percentile: 0.80515
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100f18e4210f1865b2f066038b2f88312281a9404f7ff7cd59fcfbea0669aeee9ac022100f215afcd359f6ca4af695e3a9c9175327d59285ff671ea74ea60a202266f0d77:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502205a1442c7eb2700282f25ed50e6159e04d74126a65f130ccfb2d5d95b96cdde73022100dbeb298277ef56bf7b3df32556e6b445c8a75893c6bbd72409876e0df775fb6c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-0985
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01222
|
||||
epss-percentile: 0.83791
|
||||
epss-percentile: 0.83799
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205f3386e6a26168ead161417d6a8518a8a73b8e6a76c5ab02e3572fe016177706022100d4f4590ce16ff633fb64c920e03cb081a99988f2a8cf229cf8093af78653a6f4:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100c3df6a7e5fa647ce8f9d86b4a57a39da04d29e5faa171cfafd320c954460389b022100dc07e5275762da0f8f8515186d2ba96fc3fd134a1d07f3d9f17edd9bab672a85:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1056
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06484
|
||||
epss-percentile: 0.92902
|
||||
epss-percentile: 0.92907
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022078080151ee9f5783d5856dc6582449ce8a9cd653dbc79b070ff785cc5aae7b37022100e6ea3a54a8a13814de08dfcbd8931588143ec2e89b335b9cf5d26ccea01f21a8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b6b444c98726b5c60735255eff3d41542fc30bb77305759123be42b84a6891b0022100b16252a3547e99792b7b7a069c801f34a6fa64f449149b673dd5bcd9bf62c12b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1081
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0168
|
||||
epss-percentile: 0.86255
|
||||
epss-percentile: 0.86257
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402203d272735a0c85231adf9db962d926cb7e883532fe73876b6a9fe86f8790c67760220694bc5e1eb9239ba53fcbb2692d47a166b617ef4f6fc1ed515ddbab029d40482:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ab2515ebd610c2846ad9f5a239a143e10e48c8a10239e429eff88db41c2e4db5022050065f6b4de1922278fb82d533f0f2c9a8b2033eeb73f21df0f0946910b8fa31:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1217
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.8326
|
||||
epss-percentile: 0.83268
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402200b6615c36387a95e18c523be75c9cbf17e625ccdbbbbb3282e18038198b3c3bf02207e1b1ecb22dd0ddeed3d28c56cc4e724c0794130c56ce09d2929c4fe3cdfbd65:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502204afcdfa336fb64d7ea624eeae1e7f067337bb6af9d6c57795f73dcc49366fd86022100e8ec8899f5ab8a359a8164e7ec2e16b16b28c683e58033d1cf55703e0bff917a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1219
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79857
|
||||
epss-percentile: 0.7985
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a00463044022022d19613b69de4c8d2b21bac51cbe742c225980f113fbc48aa69d8f107a13645022043413f1d97a48a830ea893ef5865a0fbbe5343bd6601cb46957c67758cdfbd20:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221009e88b0fc6d7d476db569a8d6cf1806471e2cc2fecef1f20f4685920b4ec971d7022100f063b57f608f88aa109c80c883da8809d7897cc4a7a9633c5873c2d10fe6c8e0:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1302
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01204
|
||||
epss-percentile: 0.83662
|
||||
epss-percentile: 0.8367
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100803bbd2445ecf40d1da2b7c7124584e9e50371e122d768251e616a3c719dfc7e022100b982bd9bfd4b59bcc83820b8e8ffb912b24d2a9359620f9b7e6e26fc72a73669:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220555a7f804a7a56e3cb7b02013e22a205594a2bd06e438141f491cc05c63cf0d30220033a702504e180cdacf25f34b649b07a511c1da2ce95e47d395118a2d06dcb4a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100b75f929660b7b62bedcd1651cf463dce18fc31571c7d2e5a43adc91855ecf77202203e5db2629697120f67a946c298f7c3348799e0f6cad9891503dcb5fd77f9fe4c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008d3728641bf69c1ffebc303781755bbf083f63ceaa3471fab5ed1f63bd031a16022078290d87dfca2e219be593cad3b726f7633339adf8e76a6a870392abe39a8782:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1305
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03203
|
||||
epss-percentile: 0.90083
|
||||
epss-percentile: 0.90079
|
||||
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100e9b5077d26ca9a76be4a9695ae0f4234c202754e09f6e4c5f67869d12bf6a91a02200181b05221613f25c70c57b0ab040812f70b19f8b6c45dd8f3d431e8c0a06970:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100f6deec1f977ee06c816986a2efcdb343910a773e1fbc5c812fc871722871e38502201c40d42c9ecda3fb2957ef61267c96ed5758e2aef0089db4a0124518252bc313:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1306
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.8396
|
||||
epss-percentile: 0.83966
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100bf4ada7cad6754587d40a8b650fdca801bd115cc17a408a0382b6e20a31de27502204a4099703939edffc645c7e0c775bf636e390fbe3e27d382c79748fa3080e426:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502207f4f14cc78188e5cb84f94dec10ba70a484b456993a0dfc038ecfe1fe887f019022100cc7f5b5431f50318b4f6c0c752c28116714b056eae46ce04eb51fe2c8f04dd38:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1307
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.86547
|
||||
epss-percentile: 0.8654
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100af3816911c91506ba7291d26766a2db0b3b8d273b15b98964d3cbfa82b60eba5022100cd1da25f9857fd234fd644d7f130d85512fc4a4614f2c08863c7aeb077bb265a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100fe1cdb086a90aee462b3fdd7f09fc2ba71ca3c7b82f89ba73db35e9ee5dee4fb022017e972655f18079415713efd7aab27f5a852197bb326ef2f1aeed4bd9b01fbab:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1308
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01334
|
||||
epss-percentile: 0.84546
|
||||
epss-percentile: 0.84551
|
||||
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100a1c828490faf849c5e76724af4fd20cbbaae17614c5155989626af7905359e3002210090603cce49192dd5a3e8e184e8ef937aea4b7737b21842ed3d335a2f5b62e3b7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a004830460221008cd03f0454af91209171188f2c28f4580c82dead5cd2c760d850bacb4bd782ac022100dc922f6ef2ecfd654a49f4d0727255bc918c294a3e79dda466173900c0f1a8f3:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1312
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.8326
|
||||
epss-percentile: 0.83268
|
||||
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022043c828262c065d762ffe0d4100fd0c09c8d66ea8ed0115a737efa9eda5d24621022100a33f5c43a10c56588550da66522fa2abaa62edff28032bdcb7113089366da357:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b4817e9b7b206302fd97839526dfa3e04021c0dc1a14103a4f52ed0a70f39b790221009f24a20921574708e76aca2b40af87db82be07bbb35a075d1ea0f7fae5f70ab9:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100ea35af384cc12943f0e3bf130673f84c1da5bae8700753f75cf4000a3bd89d30022028d08beef94bb1a5806f2a13563f4b5168cbe54117e66e771a64f17a9629968b:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100814ac7e014f5934e783b6e5632d9d38651e436c05f179b8163075eae23e9b4390220350283c3fc61daf7e78da82701bc2ba9e108da5d37f318cfecf701d5fe51456d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100f6c0aa9e038b513556c15a56af42c21dd76e62c64bb725c765f84448a096ccc50220653364984d0560b6bc832ce8956df4a6307166761675aba1e6a060942a60938f:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100dc05781d64155685a8e6c7169833e8a1fa74e5ef872c47c8df681121a43fbadc02201e40086e843e562c0580474cba2d7286ebba1fdc307a669f7829f8f9f2be2506:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1315
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
epss-percentile: 0.80523
|
||||
epss-percentile: 0.80515
|
||||
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a0046304402204583608f49e2b4b590237a21f3d7c9096de44d8cf3f3e3a1cb3dddb7c2253a11022027ffbe4fd4d133223d70558aeed8fd62fe8f85597212ffb7fd01a33d5b620ec9:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402204623fc66449e06a1f1b469d6522a293292ac4b2473498dd533245e66ec3d3d76022032a546d2b5427bb33cf7c5ad68c015700dc0341267514fd8314de3a429edb79f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1340
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
epss-percentile: 0.8326
|
||||
epss-percentile: 0.83268
|
||||
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022012edccf6993044e9417e38ec4b99587be8c9b0cb0bcade27f1a04644679c8a69022100c76d2fb32db972052874aa7a8821bbe04bbf9eabfd73175fe8b62ace8710f685:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402202565086bf815e09f2a59fa03b10b9db84cfd709f4c4b0c432b57827be7d34973022036c4b29d3bf01d6a11f6d687038cd8fdf0df509b3d56fbc82160efda8bd51f20:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009c081b1df026ce79009321d949b20e435246caa3141addb98759310d480f470202204ed22a95a6fc578605d120d104dc4c3e7bfb0ba440f68a88a36245d36d7b76d0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022075abddc0623b04fdc092a6aaf8fcc573587ff7fb5781b8ec6100aec3a8bae178022057b02aedf114da1ef3c89c0269c90a23b48b3aed0c57aa81c3a986958f26ef8e:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100840f9d3e0515740ab6bf20860e200cb5b18b5f4a09e19cbae729d11c1684ab2d022012ce00c5df48d9c68b59886f71eba55f2282d60387602e2ee15ebae7b6f019a6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502207c9bb56be7dbf8704d3ffce719b9aea5019cc9c1fc67a664585001dcb16cb9aa022100fe765669e4ad2e39e262133f9ea88b4b8f03b1f2a934d9ddeb3588eda867dbbd:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1353
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
epss-percentile: 0.86547
|
||||
epss-percentile: 0.8654
|
||||
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022011eac90ebf29ca2c745fe8698ac7f3bcc80bb2175d2dc1ae9242e6cb54a2c1c3022100a33f39ee714b2fcb5b823b9a2ad0611ca802c8da4da5462ae91649c35f690f58:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402206f22aa3a84a8966d8c7c539bcad4253358e1fb539038df6b73b18ce95d405e5e02203068c130be7e0668004443a5a867aafa597baabfdbd6280ab3aa86ef41c243f9:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022021d36581acf7893950efc35fb85211c3685b09fabf34ef833f4c6340f08ec4f1022100e39de2ef145e47b59321cb48971a0302c8e9f072f1646d50b2c0bc1cbfc894ab:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022072a61418d73d3c6a16fad74d13df979d7903931f2ff1f2a7fc7909b3b12750800221009525daf8a441e9bd5e3e41b7528597eca96147b5988edb7e24b8a8ab75cb5c6b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -20,7 +20,7 @@ info:
|
|||
cve-id: CVE-2010-1429
|
||||
cwe-id: CWE-264
|
||||
epss-score: 0.00573
|
||||
epss-percentile: 0.754
|
||||
epss-percentile: 0.75409
|
||||
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
|
||||
metadata:
|
||||
verified: true
|
||||
|
@ -48,4 +48,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100d1413ba511cfea9463f8676deed23b9977e3da833b46def6545589686653e61a022029a7c8156a76239cd4d3202785855e8b02d7714e01ba8692fe6bb9ac26ca644c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a004730450221008495a80f6c3175cc8ce37c5c3fe98ee634620b385bca5ed698cc9d6f820007480220348266da57d9fa1cc97396696f8da25bc87a289a66126ba04056e6a0f621813b:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100826e969266aaa94374869c4c29bef8303b00b09e228f832e390ad39183f2c7180220140632a9fe1fecafbff583cbf172d397aad67ed2de5ba16b27c36105c02f9cbd:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100ba1c5c2bc922970499aa79d010e7af83764a5840c62453ca9143ce33cb4b4fde022065d3f3d18210471fe03953520ed95afaf2cddaf226a0f599bb92de7529181d14:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1469
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
epss-percentile: 0.79857
|
||||
epss-percentile: 0.7985
|
||||
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100d0dafd07107468f55ac7ac50f28fe497aa0f14eade15dec0b31523d4f810ee9f02201f37e5472d0e8039b93e2fe2f147472edade6365897b043fc715bbeacb193c1c:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100b178e940fd44604ad61fa54c2ff3fc84064d785e0ec0ab9824485f1c8ee56c9a0220317d3e55e77c3c28b20816eb701ba35d5e9d80aacdd21ae71669742fa8552868:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1470
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04616
|
||||
epss-percentile: 0.91603
|
||||
epss-percentile: 0.91605
|
||||
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100fd9caf1ddb691a91cb9eb53bf0b4e5a23e6aceb31c2b225d5e2e61f30104f9be0221009f3e15cf384c2f5e0795d75eb5a5ad8ad1e3ce78149595951c14a79b15d5d682:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502205acd5f5d545b8533a0622c16cfb5365a080474f3c6c1d230cfa1dbde9e2d869c022100b613f9dd0f78a3c853a4f21e8b66f2c0eb9a5a5c3b064555f063fde3f8040abd:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1471
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
epss-percentile: 0.92454
|
||||
epss-percentile: 0.92459
|
||||
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450220149b25fcbd8a1eeb768c5fb5ab6540cbd886548a164ce5f423fa609a70dce723022100f5aed6b3c16347dbded09f8dda388546bec203d940bb1ced87435456bacd2907:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a0046304402201c9101d594254401129f613c946120074f08bc2761118faf69f94b55514166ee02204ef970beb16c66543685876ac56f5112cbf7e408dd6a082f9405b4053c014c6a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1472
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
epss-percentile: 0.92454
|
||||
epss-percentile: 0.92459
|
||||
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022032c8c1d8b2e0f1265ab9a3c079ca913510bd7e957bab64a51ac9a1233030858a02210081b8487368632142337ca371238f897f546aab871525a30fc318f931928b3a31:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100df4bb6c8f4a06ee5fb8d39d043cf3c8aa12c2058cfa0687aa0b6da12a5d455d70220752aac775d82f6f2bd1c6482ff6d5def8b6d3b4001595c8824d55e77983f1a16:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1473
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8002
|
||||
epss-percentile: 0.80012
|
||||
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210080b188b07ae993849eea82598bbab006d0268c5c3374fffce80864f134519769022100d2f6fb7cc3daba8023e173f8b9a5c8d04d5f1f7943743e9641c3a4a0c2a8d5e7:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022100a8ce6553da56899256ba2c695c427eb57baa977f514b9393b9da5a2fae86e27102203b4ad39f53d0886e20e7981b85527c3887cb76343ca402ecca14ee3ebc0bdb4f:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1474
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.8396
|
||||
epss-percentile: 0.83966
|
||||
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a0048304602210091bf8e07a36f02738d4bbca386ed21b8b3c0cea0f7458928f6029e7de4639b36022100a4b7e82cfeaf3cd13012871b9480477ab220d859a2d3f1e3aeb1d063935bb910:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502206c8b6345806e399d40af50736c7b9ea562dcb8b03c9dc2d54999eedc70c2915e02210092c773967cbf01e0d470e03f6b447615d6c04262d6007ed9a3fe2c88bdf29808:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1475
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
epss-percentile: 0.8396
|
||||
epss-percentile: 0.83966
|
||||
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a004830460221009db0ef11391044995d8ebf515aa652fad8c68d1efbdb05d9072f8a0a7346f6af022100eb562566942bd0f6d124b4d8c199a5d1b5b80b44282eae3b5e79568706c88f8a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100bbc5b3bd04188b8dc549f866a0268861ed2c41ef77f5c67b7c97c9dd6a99db1b022100e77f11b6f246ffa7709cc4f33d9e0328f2bb2169ec73eb2eca5410f2615b76d4:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1476
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03527
|
||||
epss-percentile: 0.90489
|
||||
epss-percentile: 0.90486
|
||||
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
|
|
@ -15,7 +15,7 @@ info:
|
|||
cve-id: CVE-2010-1478
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
epss-percentile: 0.8002
|
||||
epss-percentile: 0.80012
|
||||
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -38,4 +38,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502210098a7429a9ec6f84a3961d61b09c16d49c715f78df5f4ad584e14391811b26e6002202a565c4331e7620ffe5e812ec5d303042c916634ce874d3c1f000f4a32afde1a:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220393b61a8aa46217a8495642d08953763d733039516ed95e016d7564f72af453002203748b6d91fb6e6f2c1c915fc3fc3df1ef9ac95d4a906906abcee2588101c861a:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a004830460221009c578aa4bf8efcc2a8e8002bbf6fce964f6dd79808450700b8ebc0db4a7eb7e0022100ace3008f4d4e3b97e648e7ac7e041a163d4c238fc76b94931c051211f6943716:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100da535a45f66c3f14ba7d699217d9b2b6cb78caf6ca40970321749b44ab51c7eb022100d31e80c405075a894dfefa1cc5649ffb2f097686910fb9224fd8b9de30433368:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1494
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02305
|
||||
epss-percentile: 0.88467
|
||||
epss-percentile: 0.88457
|
||||
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a004730450221009b6df1b9f08964da9860b63d979c65d631c596c36f5c0bd133155a80a44d739502206ddee3fd0c3bb79caf7acb9c491456ab90968bce94b4b481b2cadc5ddad4dc68:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502202612077d942541a899e11a7250619ad556316ba00aa92245859d7d20205ddf2d022100aa9b7592caf83ef9cb4972057ba674246139bd2bb9480829de71836306cc9047:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
cve-id: CVE-2010-1495
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04503
|
||||
epss-percentile: 0.91503
|
||||
epss-percentile: 0.91506
|
||||
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -40,4 +40,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 490a004630440220053342f982582e6b1c664f64e18a4db76a9ef10784793f481f2920b0441b20290220440510e3eaddfd5ad6ec562db1f0ed3a8dd641eb6627d718b4d641333b7b3bf3:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a004630440220272f8d5e99ea78d75f381cc3677050664f5f5058fff3cf2cf4253ae4334577f102200189b5e583558e76abf0f8dbd9ca9c7e0c1ae0d6785dc314d94e4a7ca4962bd8:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -18,7 +18,7 @@ info:
|
|||
cve-id: CVE-2010-1531
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01815
|
||||
epss-percentile: 0.86822
|
||||
epss-percentile: 0.8681
|
||||
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -41,4 +41,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a0047304502205db6a6a8030561cc8cf3eb54867a5a5519a43f8314bc75caa7eb84641d29927d0221008d84c6c258edc591fc8983e18e81681e0e2bc8f9743d1dd5d03e99b24e5c8ce6:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a0047304502205cef28c7d707be9b8d9e2ca6523c8adb9acbd31916165e213ec91528c74b51c8022100c8621b4ae33e13328bcf2cee1d0614be01168bbe19ec2d92a40618aa795a677d:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4b0a00483046022100e7bb3506aa4e72a5fe2ec48e03d951a6197d414aef38371ecb7df191c3bf41b9022100ed897878f871ce5d25bdddca71b224c1bac400de641038a80c82c34bde5e18eb:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4a0a00473045022014abe4ffc4232b212d2e884fb2ee9d1b02fde18f8476eea72d90c88ee7ffdd800221009a0d064e053dcafd018f8d34ab274203a46c3ae52191e95cb566959a6a0968d5:922c64590222798bb761d5b6d8e72950
|
||||
|
|
|
@ -16,7 +16,7 @@ info:
|
|||
cve-id: CVE-2010-1533
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
epss-percentile: 0.78147
|
||||
epss-percentile: 0.78157
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
|
@ -39,4 +39,4 @@ http:
|
|||
status:
|
||||
- 200
|
||||
|
||||
# digest: 4a0a00473045022100fff5313d477bf35ca0ff655d09619cd959b18e64547b549d54364f9dbb66cd6e022004bd82c594d69b602825228dc6b8720ec20051828977fc2f5b0b6b7398ef9cd8:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 4b0a00483046022100b37f5b15c9730943df1d5b00193df822eeb8c7c812bc16a57a4274f5a9cec101022100ac60fcecd55cf2b56b5db71780be10044f7f2961cb92f951dc15874b1572bf2c:922c64590222798bb761d5b6d8e72950
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue