Skip to content

Commit

Permalink
TemplateMan Update [Wed Nov 8 06:56:05 UTC 2023] :robot:
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Nov 8, 2023
1 parent 9482b54 commit 64a05a9
Show file tree
Hide file tree
Showing 262 changed files with 316 additions and 255 deletions.
3 changes: 2 additions & 1 deletion http/cves/2010/CVE-2010-0219.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -59,4 +59,5 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022026db2de9624fb2807545973c3ebb685ef662106c062ba9c8e2a0baab99d0fe99022100dfa4d698983358869a73d19ecfe85905d082e719ccd38d772ec50a8414b14811:922c64590222798bb761d5b6d8e72950

# digest: 4a0a00473045022026db2de9624fb2807545973c3ebb685ef662106c062ba9c8e2a0baab99d0fe99022100dfa4d698983358869a73d19ecfe85905d082e719ccd38d772ec50a8414b14811:922c64590222798bb761d5b6d8e72950
3 changes: 2 additions & 1 deletion http/cves/2013/CVE-2013-5528.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
# digest: 4b0a004830460221008bc59dbc0f532752fed2a7282f74335dc5f67234e15ebc8e79e1c083e1a94695022100c71d6a65375403b0e32d7352b46613d3556bdb974e464791d4d426e66a661c82:922c64590222798bb761d5b6d8e72950

# digest: 4b0a004830460221008bc59dbc0f532752fed2a7282f74335dc5f67234e15ebc8e79e1c083e1a94695022100c71d6a65375403b0e32d7352b46613d3556bdb974e464791d4d426e66a661c82:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2013/CVE-2013-5979.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2013-5979
- https://bugs.launchpad.net/xibo/+bug/1093967
- http://www.baesystemsdetica.com.au/Research/Advisories/Xibo-Directory-Traversal-Vulnerability-(DS-2013-00
- http://www.baesystemsdetica.com.au/Research/Advisories/Xibo-Directory-Traversal-Vulnerability-%28DS-2013-00
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
Expand Down
3 changes: 2 additions & 1 deletion http/cves/2017/CVE-2017-7925.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -45,4 +45,5 @@ http:
group: 1
regex:
- 1:(.*:.*):1:CtrPanel
# digest: 490a0046304402206b41eb8a7ef17b6b912840a097311740c5d12fa1e8c020c985d2a4bc70d3ea2002203cb85d0ae9145483b8641aba72c43909225386c0f78290b55f2134951e79cd0e:922c64590222798bb761d5b6d8e72950

# digest: 490a0046304402206b41eb8a7ef17b6b912840a097311740c5d12fa1e8c020c985d2a4bc70d3ea2002203cb85d0ae9145483b8641aba72c43909225386c0f78290b55f2134951e79cd0e:922c64590222798bb761d5b6d8e72950
2 changes: 1 addition & 1 deletion http/cves/2018/CVE-2018-1273.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1273
cwe-id: CWE-20,CWE-94
cwe-id: CWE-94,CWE-20
epss-score: 0.97498
epss-percentile: 0.99972
cpe: cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*
Expand Down
1 change: 1 addition & 0 deletions http/cves/2018/CVE-2018-14064.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ info:
- https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac
- https://www.exploit-db.com/exploits/45030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14064
- https://medium.com/%40s1kr10s/velotismart-0day-ca5056bcdcac
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
Expand Down
5 changes: 3 additions & 2 deletions http/cves/2018/CVE-2018-17246.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-17246
cwe-id: CWE-73,CWE-829
cwe-id: CWE-829,CWE-73
epss-score: 0.96913
epss-percentile: 0.99623
cpe: cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -51,4 +51,5 @@ http:
part: header
words:
- "application/json"
# digest: 4a0a0047304502210085c0a1bdb8b23c3b4ea82babaf6d9e14d0269818d3c78b7fc7edf23ebdd83579022051d84bfeb2a86c0a113b8e85d7c84f03088825f9f02b5552b07aa40fecee1acc:922c64590222798bb761d5b6d8e72950

# digest: 4a0a0047304502210085c0a1bdb8b23c3b4ea82babaf6d9e14d0269818d3c78b7fc7edf23ebdd83579022051d84bfeb2a86c0a113b8e85d7c84f03088825f9f02b5552b07aa40fecee1acc:922c64590222798bb761d5b6d8e72950
3 changes: 2 additions & 1 deletion http/cves/2018/CVE-2018-19458.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -41,4 +41,5 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402201e2aafd10a5d676e6c22342ee8731dbc622158609f482aee6e71ca22cb5f70910220568d0651873755b6691a3e84ee8ea2b7fb181b722b855ed8df5bedd13cfcd323:922c64590222798bb761d5b6d8e72950

# digest: 490a0046304402201e2aafd10a5d676e6c22342ee8731dbc622158609f482aee6e71ca22cb5f70910220568d0651873755b6691a3e84ee8ea2b7fb181b722b855ed8df5bedd13cfcd323:922c64590222798bb761d5b6d8e72950
5 changes: 3 additions & 2 deletions http/cves/2018/CVE-2018-3760.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2018-3760
cwe-id: CWE-22,CWE-200
cwe-id: CWE-200,CWE-22
epss-score: 0.05013
epss-percentile: 0.91988
cpe: cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*
Expand Down Expand Up @@ -54,4 +54,5 @@ http:
- "/etc/passwd is no longer under a load path: (.*?),"
internal: true
part: body
# digest: 490a004630440220054da8efbd6a97914ec452a95fc142cab6ab3f8c72ad550a812d07484fba7c100220720fbcbc443b62e1c04628c97446e62a516b864fc8ffeb5eee5718e76aa6f713:922c64590222798bb761d5b6d8e72950

# digest: 490a004630440220054da8efbd6a97914ec452a95fc142cab6ab3f8c72ad550a812d07484fba7c100220720fbcbc443b62e1c04628c97446e62a516b864fc8ffeb5eee5718e76aa6f713:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2018/CVE-2018-8033.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ info:
reference:
- https://lists.apache.org/thread.html/e8fb551e86e901932081f81ee9985bb72052b4d412f23d89b1282777@%3Cuser.ofbiz.apache.org%3E
- https://nvd.nist.gov/vuln/detail/CVE-2018-8033
- https://lists.apache.org/thread.html/e8fb551e86e901932081f81ee9985bb72052b4d412f23d89b1282777%40%3Cuser.ofbiz.apache.org%3E
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
Expand Down
5 changes: 3 additions & 2 deletions http/cves/2019/CVE-2019-11248.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
cvss-score: 8.2
cve-id: CVE-2019-11248
cwe-id: CWE-419,CWE-862
cwe-id: CWE-862,CWE-419
epss-score: 0.72895
epss-percentile: 0.97755
cpe: cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
Expand All @@ -42,4 +42,5 @@ http:
- "Profile Descriptions"
- "goroutine profile: total"
condition: or
# digest: 4a0a0047304502204c001297025d06b8618f11586210a8e3a8a9b466aa9bfb2e0c81e9a9a9ce481402210080b049613355672551b051150144d007c69052d32512a6b0035fb91f66d3a76c:922c64590222798bb761d5b6d8e72950

# digest: 4a0a0047304502204c001297025d06b8618f11586210a8e3a8a9b466aa9bfb2e0c81e9a9a9ce481402210080b049613355672551b051150144d007c69052d32512a6b0035fb91f66d3a76c:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2019/CVE-2019-12990.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ info:
- https://www.tenable.com/security/research/tra-2019-31
- https://support.citrix.com/search?searchQuery=*&lang=en&sort=relevance&prod=&pver=&ct=Security+Bulletin
- https://nvd.nist.gov/vuln/detail/CVE-2019-12990
- https://support.citrix.com/search?searchQuery=%2A&lang=en&sort=relevance&prod=&pver=&ct=Security+Bulletin
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
Expand Down
5 changes: 3 additions & 2 deletions http/cves/2019/CVE-2019-1898.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2019-1898
cwe-id: CWE-285,CWE-425
cwe-id: CWE-425,CWE-285
epss-score: 0.07254
epss-percentile: 0.93315
cpe: cpe:2.3:o:cisco:rv110w_firmware:-:*:*:*:*:*:*:*
Expand All @@ -42,4 +42,5 @@ http:
- 'contains(to_lower(body), "ethernet") && contains(to_lower(body), "connection")'
- 'contains(header, "application/octet-stream")'
condition: and
# digest: 4b0a00483046022100d385ac556f3b8e77ced0b10176050fe3de55e85b2cf39a862e891efadce9bf7e022100f48bd0285b01f8be86e316c547a2a2ed1f615c63a69c31014f2af6a93f742518:922c64590222798bb761d5b6d8e72950

# digest: 4b0a00483046022100d385ac556f3b8e77ced0b10176050fe3de55e85b2cf39a862e891efadce9bf7e022100f48bd0285b01f8be86e316c547a2a2ed1f615c63a69c31014f2af6a93f742518:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2019/CVE-2019-20183.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ info:
- https://www.exploit-db.com/exploits/49596
- https://medium.com/@Pablo0xSantiago/cve-2019-20183-employee-records-system-bypass-file-upload-to-rce-ea2653660b34
- https://nvd.nist.gov/vuln/detail/CVE-2019-20183
- https://medium.com/%40Pablo0xSantiago/cve-2019-20183-employee-records-system-bypass-file-upload-to-rce-ea2653660b34
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.2
Expand Down
3 changes: 2 additions & 1 deletion http/cves/2020/CVE-2020-11034.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -37,4 +37,5 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'
# digest: 4a0a004730450220786e24a9bfa3573fb31917177c99e8debbd7f598487da0448e251c9e4e8a9ab5022100ef6a7b32ef711723856bee1736bc45b1c14fe4ac84e44fb9f3d47769c5e0136c:922c64590222798bb761d5b6d8e72950

# digest: 4a0a004730450220786e24a9bfa3573fb31917177c99e8debbd7f598487da0448e251c9e4e8a9ab5022100ef6a7b32ef711723856bee1736bc45b1c14fe4ac84e44fb9f3d47769c5e0136c:922c64590222798bb761d5b6d8e72950
3 changes: 2 additions & 1 deletion http/cves/2020/CVE-2020-13942.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -79,4 +79,5 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402200f8b3eb4bcdc99627d56edf9ed793396a906fab929041bbb8336d8f331ea27ca022034969614d712acf73b8e0f8eb1987a87ab2b2f56620f72cd790648446392424a:922c64590222798bb761d5b6d8e72950

# digest: 490a0046304402200f8b3eb4bcdc99627d56edf9ed793396a906fab929041bbb8336d8f331ea27ca022034969614d712acf73b8e0f8eb1987a87ab2b2f56620f72cd790648446392424a:922c64590222798bb761d5b6d8e72950
2 changes: 1 addition & 1 deletion http/cves/2020/CVE-2020-17518.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
cvss-score: 7.5
cve-id: CVE-2020-17518
cwe-id: CWE-22,CWE-23
cwe-id: CWE-23,CWE-22
epss-score: 0.97459
epss-percentile: 0.99948
cpe: cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*
Expand Down
5 changes: 3 additions & 2 deletions http/cves/2020/CVE-2020-27866.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ info:
cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2020-27866
cwe-id: CWE-287,CWE-288
cwe-id: CWE-288,CWE-287
epss-score: 0.00433
epss-percentile: 0.7181
cpe: cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -47,4 +47,5 @@ http:
- type: status
status:
- 200
# digest: 490a0046304402205a37c69841e0958e17609734ce7e4b5cbaceac0d679c05f334a7b6989491a25d0220707177897a948d980f82a89896ebf75aee2fc731d93ccf22896bebde525333ff:922c64590222798bb761d5b6d8e72950

# digest: 490a0046304402205a37c69841e0958e17609734ce7e4b5cbaceac0d679c05f334a7b6989491a25d0220707177897a948d980f82a89896ebf75aee2fc731d93ccf22896bebde525333ff:922c64590222798bb761d5b6d8e72950
5 changes: 3 additions & 2 deletions http/cves/2020/CVE-2020-3452.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2020-3452
cwe-id: CWE-20,CWE-22
cwe-id: CWE-22,CWE-20
epss-score: 0.97541
epss-percentile: 0.99992
cpe: cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
Expand All @@ -42,4 +42,5 @@ http:
- "INTERNAL_PASSWORD_ENABLED"
- "CONF_VIRTUAL_KEYBOARD"
condition: and
# digest: 490a0046304402201f7ea940ad7ec7da88dea5a91c2e57147f02d5b371f6bc89b32bf9db0dcda07802200d408ffdb0123b2d32ed710efafe8b1a91db98600d89dbbe014d253373647fce:922c64590222798bb761d5b6d8e72950

# digest: 490a0046304402201f7ea940ad7ec7da88dea5a91c2e57147f02d5b371f6bc89b32bf9db0dcda07802200d408ffdb0123b2d32ed710efafe8b1a91db98600d89dbbe014d253373647fce:922c64590222798bb761d5b6d8e72950
2 changes: 1 addition & 1 deletion http/cves/2020/CVE-2020-5284.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2020-5284
cwe-id: CWE-22,CWE-23
cwe-id: CWE-23,CWE-22
epss-score: 0.00152
epss-percentile: 0.51346
cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
Expand Down
3 changes: 2 additions & 1 deletion http/cves/2020/CVE-2020-5405.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022016820856a8c0cf145c5c160cc961a40ca2c8768286db3e7125983ccd0e96859e022100d90c0c9f164794683450a696df779cbd7925b844404a0e356acb7500452d18f9:922c64590222798bb761d5b6d8e72950

# digest: 4a0a00473045022016820856a8c0cf145c5c160cc961a40ca2c8768286db3e7125983ccd0e96859e022100d90c0c9f164794683450a696df779cbd7925b844404a0e356acb7500452d18f9:922c64590222798bb761d5b6d8e72950
4 changes: 2 additions & 2 deletions http/cves/2020/CVE-2020-5412.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2020-5412
cwe-id: CWE-441,CWE-610
cwe-id: CWE-610,CWE-441
epss-score: 0.39161
epss-percentile: 0.96828
cpe: cpe:2.3:a:vmware:spring_cloud_netflix:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -46,4 +46,4 @@ http:
- 200

# To get crithit, try http://169.254.169.254/latest/metadata/
# digest: 4a0a0047304502206477eb0867a179b179cfa3fef4638f72964070e9bd6453ee538ea88f1805523b022100e8bb3d32c0da0b2d58c69d1fbb6615f3aa7250ffcacb0fd204958be86f1a12f2:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502206477eb0867a179b179cfa3fef4638f72964070e9bd6453ee538ea88f1805523b022100e8bb3d32c0da0b2d58c69d1fbb6615f3aa7250ffcacb0fd204958be86f1a12f2:922c64590222798bb761d5b6d8e72950
5 changes: 3 additions & 2 deletions http/cves/2020/CVE-2020-8193.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score: 6.5
cve-id: CVE-2020-8193
cwe-id: CWE-284,CWE-287
cwe-id: CWE-287,CWE-284
epss-score: 0.93748
epss-percentile: 0.98863
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -78,4 +78,5 @@ http:
- "(?m)[0-9]{3,10}\\.[0-9]+"
internal: true
part: body
# digest: 4a0a004730450220193b0bb7e695892ee026e92f0650b354b62e4c6bf905af7b0d11c8b6cb51dcd2022100aded30b2d76f0742d9f2a88fa17fc8942a30b5c7e0bbce0956c7637adc808d29:922c64590222798bb761d5b6d8e72950

# digest: 4a0a004730450220193b0bb7e695892ee026e92f0650b354b62e4c6bf905af7b0d11c8b6cb51dcd2022100aded30b2d76f0742d9f2a88fa17fc8942a30b5c7e0bbce0956c7637adc808d29:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2020/CVE-2020-8515.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ info:
- https://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices-en/
- https://nvd.nist.gov/vuln/detail/CVE-2020-8515
- https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html
- https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-%28cve-2020-8515%29/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
Expand Down
5 changes: 3 additions & 2 deletions http/cves/2021/CVE-2021-1472.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-1472
cwe-id: CWE-119,CWE-287
cwe-id: CWE-287,CWE-119
epss-score: 0.97318
epss-percentile: 0.99842
cpe: cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*
Expand Down Expand Up @@ -77,4 +77,5 @@ http:
part: body
words:
- '"jsonrpc":'
# digest: 490a0046304402203a9886455e2eb98321b130841f78f9169854c7096be78cc0df7146c039615fc1022019b426855a8b364828546030add180d70ee0bd4a9a2f7a1cf984efddff82c9bf:922c64590222798bb761d5b6d8e72950

# digest: 490a0046304402203a9886455e2eb98321b130841f78f9169854c7096be78cc0df7146c039615fc1022019b426855a8b364828546030add180d70ee0bd4a9a2f7a1cf984efddff82c9bf:922c64590222798bb761d5b6d8e72950
5 changes: 3 additions & 2 deletions http/cves/2021/CVE-2021-20038.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-20038
cwe-id: CWE-121,CWE-787
cwe-id: CWE-787,CWE-121
epss-score: 0.95763
epss-percentile: 0.99242
cpe: cpe:2.3:o:sonicwall:sma_200_firmware:10.2.0.8-37sv:*:*:*:*:*:*:*
Expand Down Expand Up @@ -53,4 +53,5 @@ http:
part: interactsh_request
words:
- "User-Agent: {{useragent}}"
# digest: 4a0a0047304502206bbb684e5666ef4222e7d870c71a9d957b7f7fdca8d9299ce4cfb1ca59493cea022100ebbccf2a88e2a0b0b1b949d8ddf6b5ad2f9c780b1f1a7b047fc2b387efcd53a9:922c64590222798bb761d5b6d8e72950

# digest: 4a0a0047304502206bbb684e5666ef4222e7d870c71a9d957b7f7fdca8d9299ce4cfb1ca59493cea022100ebbccf2a88e2a0b0b1b949d8ddf6b5ad2f9c780b1f1a7b047fc2b387efcd53a9:922c64590222798bb761d5b6d8e72950
3 changes: 2 additions & 1 deletion http/cves/2021/CVE-2021-24146.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -43,4 +43,5 @@ http:
- type: status
status:
- 200
# digest: 4b0a0048304602210087a3cdb35788a3c22a1ffbaf04e871495cc2f83febb0f8628c6d9c1a6990a5e502210088e0b5b0a73d9734caa98031eaf24f4e3da49e3a46c91aa535b89b6f61f731d5:922c64590222798bb761d5b6d8e72950

# digest: 4b0a0048304602210087a3cdb35788a3c22a1ffbaf04e871495cc2f83febb0f8628c6d9c1a6990a5e502210088e0b5b0a73d9734caa98031eaf24f4e3da49e3a46c91aa535b89b6f61f731d5:922c64590222798bb761d5b6d8e72950
6 changes: 4 additions & 2 deletions http/cves/2021/CVE-2021-24215.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,12 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2021-24215
- https://www.opencve.io/cve/CVE-2021-24215
- https://m0ze.ru/vulnerability/[2021-03-18]-[WordPress]-[CWE-284]-Controlled-Admin-Access-WordPress-Plugin-v1.4.0.txt
- https://m0ze.ru/vulnerability/%5B2021-03-18%5D-%5BWordPress%5D-%5BCWE-284%5D-Controlled-Admin-Access-WordPress-Plugin-v1.4.0.txt
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-24215
cwe-id: CWE-425,CWE-284
cwe-id: CWE-284,CWE-425
epss-score: 0.07303
epss-percentile: 0.93334
cpe: cpe:2.3:a:wpruby:controlled_admin_access:*:*:*:*:*:wordpress:*:*
Expand Down Expand Up @@ -49,4 +50,5 @@ http:
- 'contains(content_type_2, "text/html")'
- 'contains(body_2, "This page allows direct access to your site settings") && contains(body_2, "Controlled Admin Access")'
condition: and
# digest: 4a0a00473045022077222f59aa08e30be79b032e116950aa455ff4996f317cc4d6de96a4795e379e022100b3f752c0c888b44e22613619300becb7c780cac8e02d6ae2bf61948ab0835cbe:922c64590222798bb761d5b6d8e72950

# digest: 4a0a00473045022077222f59aa08e30be79b032e116950aa455ff4996f317cc4d6de96a4795e379e022100b3f752c0c888b44e22613619300becb7c780cac8e02d6ae2bf61948ab0835cbe:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2021/CVE-2021-24235.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ info:
- https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139
- https://m0ze.ru/vulnerability/[2021-02-10]-[WordPress]-[CWE-79]-Goto-WordPress-Theme-v1.9.txt
- https://nvd.nist.gov/vuln/detail/CVE-2021-24235
- https://m0ze.ru/vulnerability/%5B2021-02-10%5D-%5BWordPress%5D-%5BCWE-79%5D-Goto-WordPress-Theme-v1.9.txt
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
Expand Down
1 change: 1 addition & 0 deletions http/cves/2021/CVE-2021-24335.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ info:
- https://m0ze.ru/vulnerability/[2021-02-12]-[WordPress]-[CWE-79]-Car-Repair-Services-WordPress-Theme-v3.9.txt
- https://wpscan.com/vulnerability/39258aba-2449-4214-a490-b8e46945117d
- https://nvd.nist.gov/vuln/detail/CVE-2021-24335
- https://m0ze.ru/vulnerability/%5B2021-02-12%5D-%5BWordPress%5D-%5BCWE-79%5D-Car-Repair-Services-WordPress-Theme-v3.9.txt
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
Expand Down
2 changes: 1 addition & 1 deletion http/cves/2021/CVE-2021-24947.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2021-24947
cwe-id: CWE-352,CWE-863
cwe-id: CWE-863,CWE-352
epss-score: 0.00291
epss-percentile: 0.6572
cpe: cpe:2.3:a:thinkupthemes:responsive_vector_maps:*:*:*:*:*:wordpress:*:*
Expand Down
3 changes: 2 additions & 1 deletion http/cves/2021/CVE-2021-27850.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -64,4 +64,5 @@ http:
- '\/assets\/app\/([a-z0-9]+)\/services\/AppMod'
internal: true
part: header
# digest: 4b0a00483046022100edfc0cda45c2774db43e5b65a4eec7ec855d63f5dec4944387f05356d4a02c25022100e1a712cb2751fe9b66c9c1fe3cb62f1d53a74cc21b02da12b2396b603c772f8d:922c64590222798bb761d5b6d8e72950

# digest: 4b0a00483046022100edfc0cda45c2774db43e5b65a4eec7ec855d63f5dec4944387f05356d4a02c25022100e1a712cb2751fe9b66c9c1fe3cb62f1d53a74cc21b02da12b2396b603c772f8d:922c64590222798bb761d5b6d8e72950
1 change: 1 addition & 0 deletions http/cves/2021/CVE-2021-3110.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ info:
- https://medium.com/@gondaliyajaimin797/cve-2021-3110-75a24943ca5e
- https://www.exploit-db.com/exploits/49410
- https://nvd.nist.gov/vuln/detail/CVE-2021-3110
- https://medium.com/%40gondaliyajaimin797/cve-2021-3110-75a24943ca5e
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
Expand Down
4 changes: 2 additions & 2 deletions http/cves/2021/CVE-2021-33544.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -19,11 +19,11 @@ info:
cwe-id: CWE-78
epss-score: 0.97519
epss-percentile: 0.99983
cpe: cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*
cpe: cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: geutebrueck
product: g-cam_ebc-2110_firmware
product: g-cam_ebc-2110
tags: cve,cve2021,geutebruck,rce,oast

http:
Expand Down
Loading

0 comments on commit 64a05a9

Please sign in to comment.