[WebsiteBaker]
url=http://www.websitebaker.org/
safe=2.8
vuln=http://start.websitebaker2.org/de/wb-2.8.php
file=version.php
variable=VERSION
extra_match=Website Baker Project
subdir=3

[toendaCMS]
url=http://www.toendacms.com/
safe=
vuln=CVE-2007-1872
file=tcms_version.xml
variable=release
subdir=2

[Drupal]
url=http://www.drupal.org/
safe=6.16
old_safe=5.22
vuln=http://drupal.org/node/731710
file=system.module
variable=define('VERSION'
subdir=2

[PHPNuke]
url=http://phpnuke.org/
# I'm not really sure about that, but 8.0 is at least vulnerable
# Versions pre 8.0 aren't easily detectable
safe=8.1
vuln=CVE-2007-1519
file=version.php
variable=$version_number
extra_match=PHP-Nuke $version_number
subdir=2

[Typo3]
url=http://typo3.org/
safe=4.3.2
old_safe=4.2.12
vuln=http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-004/
file=config_default.php
variable=$TYPO_VERSION
subdir=1

[Joomla-deprecated]
url=http://www.joomla.org/
safe=1.5.15
old_safe=1.0.15
vuln=http://developer.joomla.org/security/news/305-20091103-core-front-end-editor-issue-.html
file=version.php
variable=var $RELEASE,var $DEV_LEVEL
extra_match=@package Joomla
subdir=1

# 1.5 has changed identification
[Joomla]
url=http://www.joomla.org/
safe=1.5.15
old_safe=1.0.15
vuln=http://developer.joomla.org/security/news/305-20091103-core-front-end-editor-issue-.html
file=version.php
variable=var $RELEASE,var $DEV_LEVEL
extra_match=@package	Joomla.Framework
subdir=2

[Mambo]
url=http://www.source.mambo-foundation.org/
safe=4.6.5
vuln=CVE-2008-2905
file=version.php
variable=var $RELEASE,var $DEV_LEVEL
extra_match=@package Mambo
subdir=1

[w-Agora]
url=http://www.w-agora.net/
# last release 4.2.1 in 2006-07-12
safe=
vuln=CVE-2007-0607
file=misc_func.php
variable=$v =
subdir=1
extra_match=w-agora version $v

[MODx]
url=http://www.modxcms.com/
safe=0.9.6.3
vuln=http://modxcms.com/about/blog/rthrash/another-year-for-modx-and-a-new-release.html
file=version.inc.php
variable=$version
subdir=2
extra_match=$full_appname = 'MODx'

[PostNuke]
# This one is a hell to detect, not sure for how many versions this works
url=http://www.postnuke.com
# 0.764 last stable in 2006-11-20, 0.8.0.0 rcs available
safe=
vuln=CVE-2007-0385
file=global.php
variable=_MESSAGE_00_a
subdir=2
extra_match=http://www.pn-cms.de

[Contenido]
url=http://www.contenido.org/
safe=4.8.11
vuln=http://forum.contenido.org/viewtopic.php?f=25&t=23254
file=config.misc.php
variable=$cfg['version']
subdir=1
extra_match=Contenido Misc Configurations

[SilverStripe]
url=http://www.silverstripe.com
safe=2.3.1
vuln=CVE-2009-1433
file=silverstripe_version
variable=
subdir=0

[CMSMadeSimple]
url=http://www.cmsmadesimple.org/
safe=1.6.3
vuln=http://blog.cmsmadesimple.org/2009/08/05/announcing-cmsms-163-touho/
file=version.php
variable=$CMS_VERSION
subdir=0