"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-05-21 06:00:33 +00:00
parent 40cee2821c
commit c8bf7f7b92
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
8 changed files with 566 additions and 268 deletions

View File

@ -1,55 +1,12 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"DATE_PUBLIC": "2020-05-06T16:00:00.000Z",
"ID": "CVE-2020-8899",
"STATE": "PUBLIC",
"TITLE": "Memory corruption in Quram library when decoding qmg can lead to RCE"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Android OS",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_name": "Oreo",
"version_value": "8.x"
},
{
"version_affected": "=",
"version_name": "Pie",
"version_value": "9.0"
},
{
"version_affected": "=",
"version_name": "Q",
"version_value": "10.0"
}
]
}
}
]
},
"vendor_name": "Samsung"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Mateusz Jurczyk of Google Project Zero"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-8899",
"ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
@ -58,69 +15,86 @@
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
{
"baseScore": "9.7",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P",
"version": "2.0"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
"value": "CWE-122 Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Samsung",
"product": {
"product_data": [
{
"product_name": "Android OS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.0"
},
{
"version_affected": "=",
"version_value": "10.0"
},
{
"version_affected": "<",
"version_name": "8.x",
"version_value": "Oreo*"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://security.samsungmobile.com/securityUpdate.smsb",
"refsource": "CONFIRM",
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2002",
"refsource": "CONFIRM",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2002"
},
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html"
"name": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"refsource": "CERT-VN",
"name": "VU#366027",
"url": "https://www.kb.cert.org/vuls/id/366027"
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2002",
"refsource": "MISC",
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2002"
},
{
"url": "http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157620/Samsung-Android-Remote-Code-Execution.html"
},
{
"url": "https://www.kb.cert.org/vuls/id/366027",
"refsource": "MISC",
"name": "https://www.kb.cert.org/vuls/id/366027"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"source": {
"discovery": "INTERNAL"
}
},
"credits": [
{
"lang": "en",
"value": "Mateusz Jurczyk of Google Project Zero"
}
]
}

View File

@ -1,44 +1,12 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2020-8903",
"STATE": "PUBLIC",
"TITLE": "Priviged Escalation in Google Cloud Platform's Guest-OSLogin"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "guest-oslogin",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_name": "stable",
"version_value": "20190304"
}
]
}
}
]
},
"vendor_name": "Google LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Chris Moberly"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-8903",
"ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
@ -47,67 +15,97 @@
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-276 Incorrect Default Permissions"
"value": "CWE-276 Incorrect Default Permissions",
"cweId": "CWE-276"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google LLC",
"product": {
"product_data": [
{
"product_name": "guest-oslogin",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "20200507",
"status": "affected",
"version": "20190304",
"versionType": "date"
},
{
"status": "unaffected",
"version": "20200507",
"versionType": "date"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29",
"refsource": "CONFIRM",
"url": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29"
},
{
"name": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020",
"url": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29",
"refsource": "MISC",
"url": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"
"name": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29"
},
{
"name": "https://cloud.google.com/support/bulletins/#gcp-2020-008",
"url": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020",
"refsource": "MISC",
"url": "https://cloud.google.com/support/bulletins/#gcp-2020-008"
"name": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0996",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html"
"url": "https://cloud.google.com/support/bulletins/#gcp-2020-008",
"refsource": "MISC",
"name": "https://cloud.google.com/support/bulletins/#gcp-2020-008"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1014",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"source": {
"discovery": "EXTERNAL"
}
},
"credits": [
{
"lang": "en",
"value": "Chris Moberly"
}
]
}

View File

@ -1,44 +1,12 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2020-8907",
"STATE": "PUBLIC",
"TITLE": "Priviged Escalation in Google Cloud Platform's Guest-OSLogin"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "guest-oslogin",
"version": {
"version_data": [
{
"version_affected": ">=",
"version_name": "stable",
"version_value": "20190304"
}
]
}
}
]
},
"vendor_name": "Google LLC"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Chris Moberly"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-8907",
"ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
@ -47,67 +15,97 @@
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-276 Incorrect Default Permissions"
"value": "CWE-276 Incorrect Default Permissions",
"cweId": "CWE-276"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google LLC",
"product": {
"product_data": [
{
"product_name": "guest-oslogin",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "20200507",
"status": "affected",
"version": "20190304",
"versionType": "date"
},
{
"status": "unaffected",
"version": "20200507",
"versionType": "date"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"name": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29",
"refsource": "CONFIRM",
"url": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29"
},
{
"name": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020",
"url": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29",
"refsource": "MISC",
"url": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"
"name": "https://github.com/GoogleCloudPlatform/guest-oslogin/pull/29"
},
{
"name": "https://cloud.google.com/support/bulletins/#gcp-2020-008",
"url": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020",
"refsource": "MISC",
"url": "https://cloud.google.com/support/bulletins/#gcp-2020-008"
"name": "https://gitlab.com/gitlab-com/gl-security/gl-redteam/red-team-tech-notes/-/tree/master/oslogin-privesc-june-2020"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0996",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html"
"url": "https://cloud.google.com/support/bulletins/#gcp-2020-008",
"refsource": "MISC",
"name": "https://cloud.google.com/support/bulletins/#gcp-2020-008"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1014",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html"
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00037.html"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00047.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"source": {
"discovery": "EXTERNAL"
}
},
"credits": [
{
"lang": "en",
"value": "Chris Moberly"
}
]
}

View File

@ -1,18 +1,80 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-2189",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Social Icons Widget & Block by WPZOOM WordPress plugin before 4.2.18 does not sanitise and escape some of its Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Social Icons Widget & Block by WPZOOM",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.2.18"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Dmitrii Ignatyev"
},
{
"lang": "en",
"value": "WPScan"
}
]
}

View File

@ -1,18 +1,80 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-4061",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Survey Maker WordPress plugin before 4.2.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Survey Maker ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.2.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Krugov Artyom"
},
{
"lang": "en",
"value": "WPScan"
}
]
}

View File

@ -1,18 +1,89 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-4289",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Sailthru Triggermail",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "1.1"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Bob Matyas"
},
{
"lang": "en",
"value": "WPScan"
}
]
}

View File

@ -1,18 +1,89 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-4290",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Sailthru Triggermail",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "1.1"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Bob Matyas"
},
{
"lang": "en",
"value": "WPScan"
}
]
}

View File

@ -1,18 +1,80 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-4372",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Carousel Slider WordPress plugin before 2.2.11 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Carousel Slider",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "2.2.11"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Dmitrii Ignatyev"
},
{
"lang": "en",
"value": "WPScan"
}
]
}